Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks

Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen*

*Corresponding author for this work

Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

Abstract

Many decentralized systems rely on flooding protocols for message dissemination. In such a protocol, the sender of a message sends it to a randomly selected set of peers. These peers again send the message to their randomly selected peers, until every network participant has received the message. This type of protocols clearly fail in face of an adaptive adversary who can simply corrupt all peers of the sender and thereby prevent the message from being delivered. Nevertheless, flooding protocols are commonly used within protocols that aim to be cryptographically secure, most notably in blockchain protocols. While it is possible to revert to static corruptions, this gives unsatisfactory security guarantees, especially in the setting of a blockchain that is supposed to run for an extended period of time. To be able to provide meaningful security guarantees in such settings, we give precise semantics to what we call δ -delayed adversaries in the Universal Composability (UC) framework. Such adversaries can adaptively corrupt parties, but there is a delay of time δ from when an adversary decides to corrupt a party until they succeed in overtaking control of the party. Within this model, we formally prove the intuitive result that flooding protocols are secure against δ -delayed adversaries when δ is at least the time it takes to send a message from one peer to another plus the time it takes the recipient to resend the message. To this end, we show how to reduce the adaptive setting with a δ -delayed adversary to a static experiment with an Erdős-Rényi graph. Using the established theory of Erdős-Rényi graphs, we provide upper bounds on the propagation time of the flooding functionality for different neighborhood sizes of the gossip network. More concretely, we show the following for security parameter κ, point-to-point channels with delay at most Δ, and n parties in total, with a sufficiently delayed adversary that can corrupt any constant fraction of the parties: If all parties send to Ω(κ) parties on average, then we can realize a flooding functionality with maximal delay O(Δ· log (n) ) ; and if all parties send to Ω(κn) parties on average, we can realize a flooding functionality with maximal delay O(Δ).

Original languageEnglish
Title of host publicationAdvances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings : 42nd Annual International Cryptology Conference, CRYPTO 2022, Procerdings
Number of pages31
PublisherSpringer, Cham
Publication date2022
Pages400-430
ISBN (Print)978-3-031-15978-7
ISBN (Electronic)978-3-031-15979-4
DOIs
Publication statusPublished - 2022
Event42nd Annual International Cryptology Conference, CRYPTO 2022 - Santa Barbara, United States
Duration: 15 Aug 202218 Aug 2022

Conference

Conference42nd Annual International Cryptology Conference, CRYPTO 2022
Country/TerritoryUnited States
CitySanta Barbara
Period15/08/202218/08/2022
SeriesLecture Notes in Computer Science
Number13508

Keywords

  • adaptive adversaries
  • blockchain
  • corruption models
  • flooding networks
  • peer-to-peer networks
  • universal composability

Fingerprint

Dive into the research topics of 'Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks'. Together they form a unique fingerprint.

Cite this