메뉴 건너뛰기




Volumn 26, Issue 4, 1997, Pages 873-933

An optimal probabilistic protocol for synchronous Byzantine agreement

Author keywords

Broadcasting; Byzantine agreement; Fault tolerant computation; Randomization

Indexed keywords

BROADCASTING; FAILURE ANALYSIS; MATHEMATICAL MODELS; POLYNOMIALS; PROBABILITY; RANDOM PROCESSES;

EID: 0031210863     PISSN: 00975397     EISSN: None     Source Type: Journal    
DOI: 10.1137/S0097539790187084     Document Type: Article
Times cited : (211)

References (37)
  • 4
    • 5244346835 scopus 로고
    • Interactive consistency in constant time
    • submitted
    • M. BEN-OR AND R. EL-YANIV, Interactive consistency in constant time, Distrib. Comput., 1991, submitted.
    • (1991) Distrib. Comput.
    • Ben-Or, M.1    El-Yaniv, R.2
  • 5
    • 0020976844 scopus 로고
    • Another advantage of free choice: Completely asynchronous agreement protocols
    • ACM, New York
    • M. BEN-OR, Another advantage of free choice: Completely asynchronous agreement protocols, in Proc. 2nd Annual Symposium on Principles of Distributed Computing, ACM, New York, 1983, pp. 27-30.
    • (1983) Proc. 2nd Annual Symposium on Principles of Distributed Computing , pp. 27-30
    • Ben-Or, M.1
  • 6
    • 0021900599 scopus 로고
    • An "o(log n)" expected rounds randomized Byzantine generals protocol
    • ACM, New York
    • G. BRACHA, An "o(log n)" expected rounds randomized Byzantine generals protocol, in Proc. 17th ACM Symposium on Theory of Computing, ACM, New York, 1985.
    • (1985) Proc. 17th ACM Symposium on Theory of Computing
    • Bracha, G.1
  • 8
    • 0022082037 scopus 로고
    • A simple and efficient randomized Byzantine agreement problem
    • B. CHOR AND B. COAN, A simple and efficient randomized Byzantine agreement problem, IEEE Trans. Software Engrg., SE-11 (1985), pp. 531-539.
    • (1985) IEEE Trans. Software Engrg. , vol.SE-11 , pp. 531-539
    • Chor, B.1    Coan, B.2
  • 11
    • 0012242251 scopus 로고
    • Randomization in Byzantine agreement
    • S. Micali, ed., JAI Press, Greenwich, CT
    • B. CHOR AND C. DWORK, Randomization in Byzantine agreement, in Randomness and Computation, S. Micali, ed., JAI Press, Greenwich, CT, 1989, pp. 433-498.
    • (1989) Randomness and Computation , pp. 433-498
    • Chor, B.1    Dwork, C.2
  • 12
    • 0020097405 scopus 로고
    • An efficient algorithm for Byzantine agreement without authentication
    • D. DOLEV, M. FISCHER, R. FOWLER, N. LYNCH, AND H. STRONG, An efficient algorithm for Byzantine agreement without authentication, Inform. and Control, 52 (1982), pp. 257-274.
    • (1982) Inform. and Control , vol.52 , pp. 257-274
    • Dolev, D.1    Fischer, M.2    Fowler, R.3    Lynch, N.4    Strong, H.5
  • 13
    • 0009768331 scopus 로고
    • The Byzantine generals strike again
    • D. DOLEV, The Byzantine generals strike again, J. Algorithms, 3 (1982), pp. 14-30.
    • (1982) J. Algorithms , vol.3 , pp. 14-30
    • Dolev, D.1
  • 16
    • 0025448931 scopus 로고
    • Flipping persuasively in constant expected time
    • C. DWORK, D. SHMOYS, AND L. STOCKMEYER, Flipping persuasively in constant expected time, SIAM J. Comput., 19 (1990), pp. 472-499.
    • (1990) SIAM J. Comput. , vol.19 , pp. 472-499
    • Dwork, C.1    Shmoys, D.2    Stockmeyer, L.3
  • 17
  • 18
    • 0022185625 scopus 로고
    • Byzantine agreement in constant expected time (and trusting no one)
    • IEEE Computer Society Press, Los Alamitos, CA
    • P. FELDMAN AND S. MICALI, Byzantine agreement in constant expected time (and trusting no one), in Proc. 26th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1985, pp. 267-276.
    • (1985) Proc. 26th Annual IEEE Symposium on Foundations of Computer Science , pp. 267-276
    • Feldman, P.1    Micali, S.2
  • 20
    • 0000613943 scopus 로고
    • A lower bound for the time to assure interactive consistency
    • M. FISCHER AND N. LYNCH, A lower bound for the time to assure interactive consistency, Inform. Process. Lett., 14 (1982), pp. 183-186.
    • (1982) Inform. Process. Lett. , vol.14 , pp. 183-186
    • Fischer, M.1    Lynch, N.2
  • 21
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure falt-tolerant protocols and public-key model
    • Springer-Verlag, Berlin
    • Z. GALIL, S. HABER, AND M. YUNG, Cryptographic computation: Secure falt-tolerant protocols and public-key model, in Proc. CRYPTO '87, Springer-Verlag, Berlin, 1987, pp. 135-155.
    • (1987) Proc. CRYPTO '87 , pp. 135-155
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 24
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • S. GOLDWASSER, S. MICALI, AND C. RACKOFF, The knowledge complexity of interactive proof-systems, SIAM. J. Comput., 18 (1989), pp. 186-208.
    • (1989) SIAM. J. Comput. , vol.18 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 25
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. GOLDWASSER, S. MICALI, AND R. RIVEST, A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput., 17 (1988), pp. 281-308.
    • (1988) SIAM J. Comput. , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 26
    • 0023545076 scopus 로고
    • How to play any mental game, or a completeness theorem for protocols with honest majority
    • ACM, New York
    • O. GOLDREICH, S. MICALI, AND A. WIGDERSON, How to play any mental game, or a completeness theorem for protocols with honest majority, in Proc. 19th ACM Symposium on Theory of Computing, ACM, New York, 1987, pp. 218-229.
    • (1987) Proc. 19th ACM Symposium on Theory of Computing , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 27
    • 0025505941 scopus 로고
    • The best of both worlds: Guaranteeing termination in fast randomized Byzantine agreement protocols
    • O. GOLDREICH AND E. PETRANK, The best of both worlds: Guaranteeing termination in fast randomized Byzantine agreement protocols, Inform. Process. Lett., 36 (1990), pp. 45-49.
    • (1990) Inform. Process. Lett. , vol.36 , pp. 45-49
    • Goldreich, O.1    Petrank, E.2
  • 29
    • 85088201127 scopus 로고
    • Collective coin tossing without assumptions nor broadcasting
    • Springer-Verlag, Berlin
    • S. MICALI AND T. RABIN, Collective coin tossing without assumptions nor broadcasting, in Proc. CRYPTO '90, Springer-Verlag, Berlin, 1990, pp. 253-266.
    • (1990) Proc. CRYPTO '90 , pp. 253-266
    • Micali, S.1    Rabin, T.2
  • 30
    • 0002187139 scopus 로고
    • Secure computation
    • Springer-Verlag, Berlin, full paper available from authors
    • S. MICALI AND P. ROGAWAY, Secure computation, in Proc. CRYPTO '91, Springer-Verlag, Berlin, 1992; full paper available from authors.
    • (1992) Proc. CRYPTO '91
    • Micali, S.1    Rogaway, P.2
  • 31
    • 0024136156 scopus 로고
    • Coordinated travel: (t + 1)-round Byzantine agreement in polynomial time
    • IEEE Computer Society Press, Los Alamitos, CA
    • Y. MOSES AND O. WAARTS, Coordinated travel: (t + 1)-round Byzantine agreement in polynomial time, in Proc. 29th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, CA, 1988, pp. 246-255.
    • (1988) Proc. 29th Annual IEEE Symposium on Foundations of Computer Science , pp. 246-255
    • Moses, Y.1    Waarts, O.2
  • 32
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • M. PEASE, R. SHOSTAK, AND L. LAMPORT, Reaching agreement in the presence of faults, J. Assoc. Comput. Mach., 27 (1980), pp. 228-234.
    • (1980) J. Assoc. Comput. Mach. , vol.27 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 33
    • 33845432604 scopus 로고
    • Probabilistic algorithms for testing primality
    • M. RABIN, Probabilistic algorithms for testing primality, J. Number Theory, 12 (1980), pp. 128-138.
    • (1980) J. Number Theory , vol.12 , pp. 128-138
    • Rabin, M.1
  • 35
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • ACM, New York
    • T. RABIN AND M. BEN-OR, Verifiable secret sharing and multiparty protocols with honest majority, in Proc. 21th ACM Symposium on Theory of Computing, ACM, New York, 1989.
    • (1989) Proc. 21th ACM Symposium on Theory of Computing
    • Rabin, T.1    Ben-Or, M.2
  • 36
    • 0001873077 scopus 로고
    • A fast Monte-Carlo test for primality
    • R. SOLOVAY AND V. STRASSEN, A fast Monte-Carlo test for primality, SIAM J. Comput., 6 (1977), pp. 84-85.
    • (1977) SIAM J. Comput. , vol.6 , pp. 84-85
    • Solovay, R.1    Strassen, V.2
  • 37
    • 0021372186 scopus 로고
    • Extending binary Byzantine agreement to multivalued Byzantine agreement
    • R. TURPIN AND B. COAN, Extending binary Byzantine agreement to multivalued Byzantine agreement, Inform. Process. Lett., 18 (1984), pp. 73-76.
    • (1984) Inform. Process. Lett. , vol.18 , pp. 73-76
    • Turpin, R.1    Coan, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.