In this work, we propose an error-free, information-theoretically secure, asynchronous multi-valued validated Byzantine agreement (MVBA) protocol, called OciorMVBA. This protocol achieves MVBA consensus on a message $\boldsymbol{w}$ with expected $O(n |\boldsymbol{w}|\log n + n^2 \log q)$ communication bits, expected $O(n^2)$ messages, expected $O(\log n)$ rounds, and expected $O(\log n)$ common coins, under optimal resilience $n \geq 3t + 1$ in an $n$-node network, where up to $t$ nodes may be dishonest. Here, $q$ denotes the alphabet size of the error correction code used in the protocol. When error correction codes with a constant alphabet size (e.g., Expander Codes) are used, $q$ becomes a constant. An MVBA protocol that guarantees all required properties without relying on any cryptographic assumptions, such as signatures or hashing, except for the common coin assumption, is said to be information-theoretically secure (IT secure). Under the common coin assumption, an MVBA protocol that guarantees all required properties in all executions is said to be error-free.
We also propose another error-free, IT-secure, asynchronous MVBA protocol, called OciorMVBArr. This protocol achieves MVBA consensus with expected $O(n |\boldsymbol{w}| + n^2 \log n)$ communication bits, expected $O(1)$ rounds, and expected $O(1)$ common coins, under a relaxed resilience (RR) of $n \geq 5t + 1$. Additionally, we propose a hash-based asynchronous MVBA protocol, called OciorMVBAh. This protocol achieves MVBA consensus with expected $O(n |\boldsymbol{w}| + n^3)$ bits, expected $O(1)$ rounds, and expected $O(1)$ common coins, under optimal resilience $n \geq 3t + 1$.
This paper proposes OciorMVBA, an error-free, information-theoretically secure asynchronous multi-valued validated Byzantine agreement (MVBA) protocol. The protocol achieves MVBA consensus on message w in an n-node network with optimal fault tolerance n ≥ 3t + 1, with expected communication complexity of O(n|w|log n + n²log q) bits, expected O(n²) messages, expected O(log n) rounds, and expected O(log n) common coin invocations. Additionally, two variant protocols are proposed: OciorMVBArr achieving O(1) round complexity under relaxed fault tolerance n ≥ 5t + 1, and hash-based OciorMVBAh achieving O(1) round complexity under optimal fault tolerance.
Multi-valued validated Byzantine agreement (MVBA) is a critical building block in distributed systems and cryptography, introduced by Cachin et al. in 2001. In MVBA, distributed nodes propose their respective input values and seek consensus on one value satisfying a predefined predicate function (external validity).
Theoretical Foundation: The seminal work of Fischer, Lynch, and Paterson demonstrates that no deterministic MVBA protocol exists in asynchronous environments; therefore, any asynchronous MVBA protocol must introduce randomness.
Practical Demand: Distributed systems require reliable consensus achievement in asynchronous networks with Byzantine faults.
Security Requirements: Information-theoretic security must be guaranteed without relying on cryptographic assumptions (except for common coin).
Proposed OciorMVBA Protocol: The first error-free, information-theoretically secure asynchronous MVBA protocol achieving near-optimal communication complexity O(n|w|log n + n²log q) under optimal fault tolerance n ≥ 3t + 1.
Designed OciorMVBArr Protocol: A protocol achieving O(n|w| + n²log n) communication complexity and O(1) round complexity under relaxed fault tolerance n ≥ 5t + 1.
Constructed OciorMVBAh Protocol: A hash-based protocol achieving O(n|w| + n³) communication complexity and O(1) round complexity under optimal fault tolerance.
Introduced New Primitives: Proposed asynchronous biased binary Byzantine agreement (ABBBA) and asynchronous complete information dispersal (ACID) as new building blocks.
Input: Each honest node proposes an input value w satisfying Predicate(w) = true
Output: All honest nodes eventually output the same value w', with Predicate(w') = true
Constraints: Satisfy three properties: consistency, termination, and external validity
Early Work: Cachin et al. first introduced the MVBA concept
Signature-Based Methods: Abraham et al., Dumbo-MVBA, and others optimized threshold signature-based protocols
Signature-Free Methods: Duan et al. proposed hash-based signature-free protocols
Information-Theoretic Security: This paper is the first to achieve near-optimal performance with information-theoretic security under optimal fault tolerance