Abstract
Several distributed protocols, including distributed key generation (DKG) and interactive consistency (IC), depend on O (n) instances of Byzantine Broadcast or Byzantine Agreement among n nodes, resulting in O (n3) communication overhead.
In this paper, we provide a new methodology of realizing such broadcasts we call DRAGON: Decentralization at the cost of Representation after Arbitrary GrOupiNg. At the core of it, we arbitrarily group nodes into small "shards" and paired with multiple new primitives we call consortium-sender (dealer) broadcast (and secret sharing). The new tools enable a shard of nodes to to jointly broadcast (or securely contribute a secret) to the whole population only at the cost of one dealer (as if there is a representative).
With our new Dragon method, we construct the first two DKG protocols, both achieving optimal resilience, with sub-cubic total communication and computation. The first DKG generates a secret key within an Elliptic Curve group, incurring Õ (n2·5λ) total communication and computation. The second DKG, while slightly increasing communication and computation by a factor of the statistical security parameter, generates a secret key as a field element, which makes it directly compatible with various off-the-shelf DLog-based threshold cryptographic systems. We also construct a first deterministic IC with sub-cubic communication.
© 2024 Copyright held by the owner/author(s).
In this paper, we provide a new methodology of realizing such broadcasts we call DRAGON: Decentralization at the cost of Representation after Arbitrary GrOupiNg. At the core of it, we arbitrarily group nodes into small "shards" and paired with multiple new primitives we call consortium-sender (dealer) broadcast (and secret sharing). The new tools enable a shard of nodes to to jointly broadcast (or securely contribute a secret) to the whole population only at the cost of one dealer (as if there is a representative).
With our new Dragon method, we construct the first two DKG protocols, both achieving optimal resilience, with sub-cubic total communication and computation. The first DKG generates a secret key within an Elliptic Curve group, incurring Õ (n2·5λ) total communication and computation. The second DKG, while slightly increasing communication and computation by a factor of the statistical security parameter, generates a secret key as a field element, which makes it directly compatible with various off-the-shelf DLog-based threshold cryptographic systems. We also construct a first deterministic IC with sub-cubic communication.
© 2024 Copyright held by the owner/author(s).
| Original language | English |
|---|---|
| Title of host publication | PODC '24 |
| Subtitle of host publication | Proceedings of the 43rd ACM Symposium on Principles of Distributed Computing |
| Publisher | Association for Computing Machinery |
| Pages | 469-479 |
| ISBN (Print) | 979-8-4007-0668-4 |
| DOIs | |
| Publication status | Published - Jun 2024 |
| Externally published | Yes |
| Event | 43rd ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2024) - Nantes, France Duration: 17 Jun 2024 → 21 Jun 2024 https://www.podc.org/podc2024/ |
Publication series
| Name | Proceedings of the Annual ACM Symposium on Principles of Distributed Computing |
|---|
Conference
| Conference | 43rd ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2024) |
|---|---|
| Place | France |
| City | Nantes |
| Period | 17/06/24 → 21/06/24 |
| Internet address |
Funding
This work was supported in part by research awards from Protocol Labs, Ethereum Foundation, Stellar Development Foundation, and SOAR Prize from the University of Sydney.
Research Keywords
- distributed key generation
- interactive consistency
Publisher's Copyright Statement
- This full text is made available under CC-BY 4.0. https://creativecommons.org/licenses/by/4.0/
Fingerprint
Dive into the research topics of 'DRAGON: Decentralization at the cost of Representation after Arbitrary Grouping and Its Applications to Sub-cubic DKG and Interactive Consistency'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver