| dc.contributor.author | Wan, Jun | |
| dc.contributor.author | Xiao, Hanshen | |
| dc.contributor.author | Shi, Elaine | |
| dc.contributor.author | Devadas, Srinivas | |
| dc.date.accessioned | 2026-02-11T21:34:50Z | |
| dc.date.available | 2026-02-11T21:34:50Z | |
| dc.date.submitted | 2025-08-08 | |
| dc.identifier.issn | 0004-5411 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/164806 | |
| dc.description.abstract | Byzantine Broadcast (BB) is a central question in distributed systems, and an important challenge is to understand its round complexity. Under the honest majority setting, it is long known that there exist randomized protocols that can achieve BB in expected constant rounds, regardless of the number of nodes n. However, whether we can match the expected constant round complexity in the corrupt majority setting --- or more precisely, when f > n/2 --- remains unknown, where f denotes the number of corrupt nodes. In this paper, we are the first to resolve this long-standing question. We show how to achieve BB in expected O((n/(n-f))2) rounds. Our results hold under a weakly adaptive adversary who cannot perform ``after-the-fact removal' of messages already sent by a node before it becomes corrupt. We also assume trusted setup and the Decision Linear (DLIN) assumption in bilinear groups. | en_US |
| dc.publisher | ACM | en_US |
| dc.relation.isversionof | http://dx.doi.org/10.1145/3748254 | en_US |
| dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
| dc.source | Association for Computing Machinery | en_US |
| dc.title | Expected Constant Round Byzantine Broadcast under Dishonest Majority | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Jun Wan, Hanshen Xiao, Elaine Shi, and Srinivas Devadas. 2025. Expected Constant Round Byzantine Broadcast under Dishonest Majority. J. ACM 72, 4, Article 30 (August 2025), 39 pages. | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
| dc.relation.journal | Journal of the ACM | en_US |
| dc.identifier.mitlicense | PUBLISHER_POLICY | |
| dc.eprint.version | Final published version | en_US |
| dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
| eprint.status | http://purl.org/eprint/status/PeerReviewed | en_US |
| dc.date.updated | 2025-08-01T09:05:32Z | |
| dc.language.rfc3066 | en | |
| dc.rights.holder | The author(s) | |
| dspace.date.submission | 2025-08-01T09:05:32Z | |
| mit.journal.volume | 72 | en_US |
| mit.journal.issue | 4 | en_US |
| mit.license | PUBLISHER_POLICY | |
| mit.metadata.status | Authority Work and Publication Information Needed | en_US |