Technical Overview. We give an overview of the main techniques used in our protocol. Expand-and-Extract. Our starting point is the recent work by Fitzi, ▇▇▇- ▇▇▇▇▇ and Loss [FLL21], where the authors provide a new elegant way to design round-efficient BA protocols, called Expand-and-Extract. The Expand-and-Extract iteration paradigm consists of three steps. The first step is an expansion step, where an input bit is expanded into a value with range ℓ, via a so-called Proxcensus protocol. This protocol guarantees that the outputs of honest parties lie within two consecutive values (see Definition 2).
Appears in 1 contract
Sources: Byzantine Agreement
Technical Overview. We give an overview of the main techniques used in our protocol. Expand-and-Extract. Our starting point is the recent work by Fitzi▇▇▇▇▇, ▇▇▇- ▇▇▇▇▇ and Loss [FLL21], where the authors provide a new elegant way to design round-efficient BA protocols, called Expand-and-Extract. The Expand-and-Extract iteration paradigm consists of three steps. The first step is an expansion step, where an input bit is expanded into a value with range ℓ, via a so-called Proxcensus protocol. This protocol guarantees that the outputs of honest parties lie within two consecutive values (see Definition 2).
Appears in 1 contract
Sources: Byzantine Agreement