
Briefing
The foundational challenge of Byzantine Broadcast in dishonest-majority networks has been the prohibitive $O(n^2)$ communication complexity, limiting the scalability of BFT-based consensus systems. This research introduces a new theoretical framework by establishing tight communication lower bounds, then constructs a novel cryptographic broadcast protocol that achieves $O(n cdot text{polylog}(n))$ total communication, a sub-quadratic cost that was previously considered unattainable in this setting. This breakthrough re-optimizes the communication overhead for all distributed systems operating under high-adversary conditions, paving the way for significantly more scalable and efficient decentralized consensus architectures.

Context
Prior to this work, achieving communication-efficient Byzantine Broadcast in a dishonest-majority setting → where a majority of network participants can be malicious → was an unsolved foundational problem in distributed computing. Existing protocols, primarily based on the classic Dolev and Strong construction, were limited by a quadratic communication complexity of $O(n^2)$, which forces a trade-off between security against a majority of corruptions and network scalability. The prevailing theoretical limitation was the lack of non-trivial lower bounds for randomized cryptographic protocols, making it unclear if sub-quadratic complexity was even possible.

Analysis
The core mechanism is the integration of randomization and cryptographic primitives into a broadcast protocol to circumvent the deterministic lower bounds that previously constrained the dishonest-majority setting. The new protocol, which is near-tight to the newly proven $Omega(n cdot text{polylog}(n))$ lower bound, leverages these primitives to ensure agreement and validity without requiring every party to communicate with every other party in a dense $O(n^2)$ graph. The protocol fundamentally differs from its predecessors by proving that a constant fraction of static corruptions can be tolerated with significantly lower communication overhead, shifting the complexity from a network-wide quadratic function to a near-linear one.

Parameters
- Total Communication Complexity → $O(n cdot text{polylog}(n))$ total messages exchanged, a sub-quadratic improvement.
- Previous Baseline Complexity → $O(n^2)$ total messages, established by the Dolev and Strong protocol.
- Adversary Model → Dishonest-majority setting, tolerating any constant fraction of static corruptions.

Outlook
This research immediately opens new avenues for designing Byzantine Fault Tolerant consensus protocols that can operate efficiently at web-scale. Future work will focus on extending the protocol to the adaptive adversary model, where corruptions occur dynamically, and applying this communication primitive to real-world sharded blockchain architectures. The long-term application is the deployment of BFT-based systems, such as finality gadgets or decentralized sequencers, that maintain security against a majority of malicious nodes while achieving throughput previously restricted to honest-majority assumptions.
