
Briefing
The foundational challenge of Byzantine Broadcast in dishonest-majority networks has been the prohibitive O(n2) communication complexity, limiting the scalability of BFT-based consensus systems. This research introduces a new theoretical framework by establishing tight communication lower bounds, then constructs a novel cryptographic broadcast protocol that achieves O(n · polylog(n)) total communication, a sub-quadratic cost that was previously considered unattainable in this setting. This breakthrough re-optimizes the communication overhead for all distributed systems operating under high-adversary conditions, paving the way for significantly more scalable and efficient decentralized consensus architectures.

Context
Prior to this work, achieving communication-efficient Byzantine Broadcast in a dishonest-majority setting ∞ where a majority of network participants can be malicious ∞ was an unsolved foundational problem in distributed computing. Existing protocols, primarily based on the classic Dolev and Strong construction, were limited by a quadratic communication complexity of O(n2), which forces a trade-off between security against a majority of corruptions and network scalability. The prevailing theoretical limitation was the lack of non-trivial lower bounds for randomized cryptographic protocols, making it unclear if sub-quadratic complexity was even possible.

Analysis
The core mechanism is the integration of randomization and cryptographic primitives into a broadcast protocol to circumvent the deterministic lower bounds that previously constrained the dishonest-majority setting. The new protocol, which is near-tight to the newly proven ω(n · polylog(n)) lower bound, leverages these primitives to ensure agreement and validity without requiring every party to communicate with every other party in a dense O(n2) graph. The protocol fundamentally differs from its predecessors by proving that a constant fraction of static corruptions can be tolerated with significantly lower communication overhead, shifting the complexity from a network-wide quadratic function to a near-linear one.

Parameters
- Total Communication Complexity ∞ O(n · polylog(n)) total messages exchanged, a sub-quadratic improvement.
- Previous Baseline Complexity ∞ O(n2) total messages, established by the Dolev and Strong protocol.
- Adversary Model ∞ Dishonest-majority setting, tolerating any constant fraction of static corruptions.

Outlook
This research immediately opens new avenues for designing Byzantine Fault Tolerant consensus protocols that can operate efficiently at web-scale. Future work will focus on extending the protocol to the adaptive adversary model, where corruptions occur dynamically, and applying this communication primitive to real-world sharded blockchain architectures. The long-term application is the deployment of BFT-based systems, such as finality gadgets or decentralized sequencers, that maintain security against a majority of malicious nodes while achieving throughput previously restricted to honest-majority assumptions.
