Improved Byzantine Agreement under an Adaptive Adversary

Dufoulon, Fabien and Pandurangan, Gopal (2025) Improved Byzantine Agreement under an Adaptive Adversary. In: Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC) :. ACM, New York, 173–180. ISBN 9798400718854

Full text not available from this repository.

Abstract

Byzantine agreement is a fundamental problem in fault-tolerant distributed computing that has been studied intensively for the last four decades. Much of the research has focused on a static Byzantine adversary, where the adversary is constrained to choose the Byzantine nodes in advance of the protocol's execution. This work focuses on the harder case of an adaptive Byzantine adversary that can choose the Byzantine nodes adaptively based on the protocol's execution. While efficient O(log n)-round protocols (n is the total number of nodes) are known for the static adversary (Ben-Or, Goldwasser, Vaikuntanathan, FOCS 2006) tolerating up to t < n/(3 + ϵ) Byzantine nodes, [EQUATION] rounds is a well-known lower bound for adaptive adversary [Bar-Joseph and Ben-Or, PODC 1998]. The best-known protocol for adaptive adversary runs in O(t/log n) rounds [Chor and Coan, IEEE Trans. Soft. Engg., 1985]. This work presents a synchronous randomized Byzantine agreement protocol under an adaptive adversary that improves over previous results. Our protocol works under the powerful adaptive rushing adversary in the full information model. That is, we assume that the Byzantine nodes can behave arbitrarily and maliciously, have knowledge about the entire state of the network at every round, including random choices made by all the nodes up to and including the current round, have unlimited computational power, and may collude among themselves. Furthermore, the adversary can adaptively corrupt up to t < n/3 nodes based on the protocol's execution. We present a simple randomized Byzantine agreement protocol that runs in O(min{t2 log n/n, t/log n}) rounds that improves over the long-standing bound of O(t/log n) rounds due to Chor and Coan [IEEE Trans. Soft. Engg., 1985]. Our bound is significantly better than that of Chor and Coan for t = o(n/log2 n) and approaches the Bar-Joseph and Ben-Or [PODC 1998] lower bound of [EQUATION] rounds when t approaches [EQUATION].

Item Type:
Contribution in Book/Report/Proceedings
Additional Information:
Accepted at PODC 2025
Uncontrolled Keywords:
Research Output Funding/no_not_funded
Subjects:
?? secure computationbyzantine protocolsbyzantine agreementadaptive adversaryrandomized protocolfull information modelno - not fundedno ??
ID Code:
232120
Deposited By:
Deposited On:
12 Dec 2025 15:30
Refereed?:
Yes
Published?:
Published
Last Modified:
12 Dec 2025 15:30