[Resource Topic] 2022/010: Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks

Welcome to the resource topic for 2022/010

Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks

Authors: Christian Matt, Jesper Buus Nielsen, and Søren Eller Thomsen


Many decentralized systems rely on flooding protocols for message dissemination. In such a protocol, the sender of a message sends it to a randomly selected set of peers. These peers again send the message to their randomly selected peers, until every network participant has received the message. This type of protocols clearly fail in face of an adaptive adversary who can simply corrupt all peers of the sender and thereby prevent the message from being delivered. Nevertheless, flooding protocols are commonly used within protocols that aim to be cryptographically secure, most notably in blockchain protocols. While it is possible to revert to static corruptions, this gives unsatisfactory security guarantees, especially in the setting of a blockchain that is supposed to run for an extended period of time. To be able to provide meaningful security guarantees in such settings, we give precise semantics to what we call \delta-delayed adversaries in the Universal Composability (UC) framework. Such adversaries can adaptively corrupt parties, but there is a delay of time \delta from when an adversary decides to corrupt a party until they succeed in overtaking control of the party. Within this model, we formally prove the intuitive result that flooding protocols are secure against \delta-delayed adversaries when \delta is at least the time it takes to send a message from one peer to another plus the time it takes the recipient to resend the message. To this end, we show how to reduce the adaptive setting with a \delta-delayed adversary to a static experiment with an Erdős–Rényi graph. Using the established theory of Erdős–Rényi graphs, we provide upper bounds on the propagation time of the flooding functionality for different neighborhood sizes of the gossip network. More concretely, we show the following for security parameter \kappa, point-to-point channels with delay at most \Delta, and n parties in total, with a sufficiently delayed adversary that can corrupt any constant fraction of the parties: If all parties send to \Omega(\kappa) parties on average, then we can realize a flooding functionality with maximal delay \mathcal{O}\bigl(\Delta \cdot \log (n) \bigr); and if all parties send to \Omega\bigl( \sqrt{\kappa n \log (n)} \bigr) parties on average, we can realize a flooding functionality with maximal delay \mathcal{O}(\Delta).

ePrint: https://eprint.iacr.org/2022/010

Talk: https://www.youtube.com/watch?v=7rDSTe6FwM8

Slides: https://iacr.org/submit/files/slides/2022/crypto/crypto2022/86/slides.pdf

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .