Communication Lower Bounds for Cryptographic Broadcast Protocols

Erica Blum,Elette Boyle,Ran Cohen,Chen-Da Liu-Zhang
DOI: https://doi.org/10.48550/arXiv.2309.01466
2023-09-04
Abstract:Broadcast protocols enable a set of $n$ parties to agree on the input of a designated sender, even facing attacks by malicious parties. In the honest-majority setting, randomization and cryptography were harnessed to achieve low-communication broadcast with sub-quadratic total communication and balanced sub-linear cost per party. However, comparatively little is known in the dishonest-majority setting. Here, the most communication-efficient constructions are based on Dolev and Strong (SICOMP '83), and sub-quadratic broadcast has not been achieved. On the other hand, the only nontrivial $\omega(n)$ communication lower bounds are restricted to deterministic protocols, or against strong adaptive adversaries that can perform "after the fact" removal of messages. We provide new communication lower bounds in this space, which hold against arbitrary cryptography and setup assumptions, as well as a simple protocol showing near tightness of our first bound. 1) We demonstrate a tradeoff between resiliency and communication for protocols secure against $n-o(n)$ static corruptions. For example, $\Omega(n\cdot {\sf polylog}(n))$ messages are needed when the number of honest parties is $n/{\sf polylog}(n)$; $\Omega(n\sqrt{n})$ messages are needed for $O(\sqrt{n})$ honest parties; and $\Omega(n^2)$ messages are needed for $O(1)$ honest parties. Complementarily, we demonstrate broadcast with $O(n\cdot{\sf polylog}(n))$ total communication facing any constant fraction of static corruptions. 2) Our second bound considers $n/2 + k$ corruptions and a weakly adaptive adversary that cannot remove messages "after the fact." We show that any broadcast protocol within this setting can be attacked to force an arbitrary party to send messages to $k$ other parties. This rules out, for example, broadcast facing 51% corruptions in which all non-sender parties have sublinear communication locality.
Cryptography and Security,Distributed, Parallel, and Cluster Computing
What problem does this paper attempt to address?
This paper attempts to solve the problem of communication complexity in broadcast protocols under the dishonest - majority setting. Specifically, the paper focuses on how to design efficient broadcast protocols in the presence of a large number of malicious parties, and also explores the feasibility and limitations of achieving low communication complexity in the face of different types of attackers (static attackers and weakly - adaptive attackers). ### Main Contributions of the Paper 1. **Lower Bound of Communication Complexity under Static Attackers**: - The paper shows the trade - off between communication complexity and robustness when facing \(n - o(n)\) static attackers. For example: - When the number of honest parties is \(n / \text{polylog}(n)\), \( \Omega(n \cdot \text{polylog}(n))\) messages are required. - When the number of honest parties is \(O(\sqrt{n})\), \( \Omega(n\sqrt{n})\) messages are required. - When the number of honest parties is a constant, \( \Omega(n^2)\) messages are required. - The paper also provides a simple protocol, proving that a broadcast protocol with a total communication complexity of \(O(n \cdot \text{polylog}(n))\) can be achieved when facing any constant - proportion static attackers. 2. **Lower Bound of Communication Locality under Weakly - Adaptive Attackers**: - The paper considers the case of \(n/2 + k\) attackers and shows that any broadcast protocol can be attacked, so that a certain party must send messages to other \(k\) parties. - This result indicates that when facing more than 51% of the attackers, it is impossible to implement a broadcast protocol with sub - linear communication locality for all non - sender parties. ### Technical Overview 1. **Lower Bound of Communication Complexity under Static Attackers**: - The basic idea of the attack is to divide all parties (except the sender) into two equal - sized subsets \(A\) and \(B\), randomly select a subset \(S\) of size \(\epsilon(n)- 1\) and a party \(P_i^*\), and then the attacker corrupts all parties except \(S\cup \{P_i^*\}\). - The attacker ensures that \(S\) and \(P_i^*\) do not communicate by running two independent protocol executions, resulting in them outputting different values. 2. **Lower Bound of Communication Locality under Weakly - Adaptive Attackers**: - The attack strategy is to divide all parties (except the sender and the target party \(P_i^*\)) into two equal - sized subsets \(S_0\) and \(S_1\), randomly select a bit \(b\), and corrupt the sender and all parties in \(S_{1 - b}\). - The attacker makes the target party \(P_i^*\) unable to determine which parties are honest by simulating different input values and crash situations, so that it must communicate with enough parties to ensure that the attacker's corruption budget is exhausted. ### Related Work - In the honest - majority setting, many protocols have achieved low communication complexity, including information - theoretic - secure and computationally - secure protocols. - In the dishonest - majority setting, the most efficient broadcast protocols are based on Dolev and Strong's protocols, but these protocols still cannot achieve sub - quadratic communication complexity. - The contribution of the paper lies in providing new lower bounds of communication complexity, applicable to any cryptographic assumptions and setting assumptions, and showing the impossibility of achieving low communication complexity in some cases. ### Summary Through strict mathematical analysis and attack strategies, the paper reveals the challenges and limitations of implementing efficient broadcast protocols in the dishonest - majority setting, providing an important theoretical basis for future research.