CISPA
Browse
cispa_all_3867.pdf (1.36 MB)

State Machine Replication under Changing Network Conditions

Download (1.36 MB)
conference contribution
posted on 2023-11-29, 18:26 authored by Andreea B. Alexandru, Erica Blum, Jonathan Katz, Julian LossJulian Loss
Protocols for state machine replication (SMR) are typically designed for synchronous or asynchronous networks, with a lower corrup- tion threshold in the latter case. Recent network-agnostic protocols are secure when run in either a synchronous or an asynchronous network. We propose two new constructions of network-agnostic SMR protocols that improve on existing protocols in terms of either the adversarial model or communication complexity: 1. an adaptively secure protocol with optimal corruption thresholds and quadratic amortized communication complexity per transaction; 2. a statically secure protocol with near-optimal corruption thresholds and linear amortized communication complexity per transaction. We further explore SMR protocols run in a network that may change between synchronous and asynchronous arbitrarily often; parties can be uncorrupted (as in the proactive model), and the protocol should remain secure as long as the appropriate corruption thresholds are maintained. We show that purely asynchronous proactive secret sharing is impossible without some form of synchronization between the parties, ruling out a natural approach to proactively secure network-agnostic SMR protocols. Motivated by this negative result, we consider a model where the ad- versary is limited in the total number of parties it can corrupt over the duration of the protocol and show, in this setting, that our SMR proto- cols remain secure even under arbitrarily changing network conditions.

History

Preferred Citation

Andreea Alexandru, Erica Blum, Jonathan Katz and Julian Loss. State Machine Replication under Changing Network Conditions. In: International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). 2022.

Primary Research Area

  • Algorithmic Foundations and Cryptography

Name of Conference

International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT)

Legacy Posted Date

2022-10-21

Open Access Type

  • Unknown

BibTeX

@inproceedings{cispa_all_3867, title = "State Machine Replication under Changing Network Conditions", author = "Alexandru, Andreea B. and Blum, Erica and Katz, Jonathan and Loss, Julian", booktitle="{International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT)}", year="2022", }

Usage metrics

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC