메뉴 건너뛰기




Volumn 75, Issue 2, 2009, Pages 91-112

On expected constant-round protocols for Byzantine agreement

Author keywords

Broadcast; Cryptography; Distributed computing; Secure computation

Indexed keywords

BROADCASTING; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; PUBLIC KEY CRYPTOGRAPHY;

EID: 58149153139     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2008.08.001     Document Type: Article
Times cited : (75)

References (46)
  • 1
    • 85048601848 scopus 로고
    • Cryptographic protocols provably secure against dynamic adversaries
    • Advances in Cryptology - Eurocrypt '92, Springer-Verlag
    • Beaver D., and Haber S. Cryptographic protocols provably secure against dynamic adversaries. Advances in Cryptology - Eurocrypt '92. Lecture Notes in Comput. Sci. vol. 658 (1993), Springer-Verlag 307-323
    • (1993) Lecture Notes in Comput. Sci. , vol.658 , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 2
    • 0025137207 scopus 로고    scopus 로고
    • D. Beaver, S. Micali, P. Rogaway, The round complexity of secure protocols, in: 22nd Annual ACM Symposium on Theory of Computing (STOC), 1990, pp. 503-513
    • D. Beaver, S. Micali, P. Rogaway, The round complexity of secure protocols, in: 22nd Annual ACM Symposium on Theory of Computing (STOC), 1990, pp. 503-513
  • 3
    • 0020976844 scopus 로고    scopus 로고
    • M. Ben-Or, Another advantage of free choice: Completely asynchronous agreement protocols, in: 2nd Annual ACM Symposium on Principles of Distributed Computing (PODC), 1983, pp. 27-30
    • M. Ben-Or, Another advantage of free choice: Completely asynchronous agreement protocols, in: 2nd Annual ACM Symposium on Principles of Distributed Computing (PODC), 1983, pp. 27-30
  • 4
    • 0346342609 scopus 로고    scopus 로고
    • Resilient-optimal interactive consistency in constant time
    • Ben-Or M., and El-Yaniv R. Resilient-optimal interactive consistency in constant time. Distrib. Comput. 16 4 (2003) 249-262
    • (2003) Distrib. Comput. , vol.16 , Issue.4 , pp. 249-262
    • Ben-Or, M.1    El-Yaniv, R.2
  • 5
    • 84898960610 scopus 로고    scopus 로고
    • M. Ben-Or, S. Goldwasser, A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in: 20th Annual ACM Symposium on Theory of Computing (STOC), 1988, pp. 1-10
    • M. Ben-Or, S. Goldwasser, A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in: 20th Annual ACM Symposium on Theory of Computing (STOC), 1988, pp. 1-10
  • 6
    • 33748112587 scopus 로고    scopus 로고
    • M. Ben-Or, E. Pavlov, V. Vaikuntanathan, Byzantine agreement in the full-information model in O (log n) rounds, in: 38th Annual ACM Symposium on Theory of Computing (STOC), 2006, pp. 179-186
    • M. Ben-Or, E. Pavlov, V. Vaikuntanathan, Byzantine agreement in the full-information model in O (log n) rounds, in: 38th Annual ACM Symposium on Theory of Computing (STOC), 2006, pp. 179-186
  • 7
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • National Computer Conference, AFIPS Press
    • Blakley G. Safeguarding cryptographic keys. National Computer Conference. Lecture Notes in Comput. Sci. vol. 48 (1979), AFIPS Press 313-317
    • (1979) Lecture Notes in Comput. Sci. , vol.48 , pp. 313-317
    • Blakley, G.1
  • 8
    • 0023436302 scopus 로고
    • An O (log n) expected rounds randomized Byzantine generals protocol
    • Bracha G. An O (log n) expected rounds randomized Byzantine generals protocol. J. ACM 34 4 (1987) 910-920
    • (1987) J. ACM , vol.34 , Issue.4 , pp. 910-920
    • Bracha, G.1
  • 9
    • 22344451864 scopus 로고    scopus 로고
    • Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography
    • Cachin C., Kursawe K., and Shoup V. Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. J. Cryptology 18 3 (2005) 219-246
    • (2005) J. Cryptology , vol.18 , Issue.3 , pp. 219-246
    • Cachin, C.1    Kursawe, K.2    Shoup, V.3
  • 10
    • 0035163054 scopus 로고    scopus 로고
    • R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in: 42nd Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2001, pp. 136-145
    • R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in: 42nd Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2001, pp. 136-145
  • 11
    • 0029723583 scopus 로고    scopus 로고
    • R. Canetti, U. Feige, O. Goldreich, M. Naor, Adaptively secure multi-party computation, in: 28th Annual ACM Symposium on Theory of Computing (STOC), 1996, pp. 639-648
    • R. Canetti, U. Feige, O. Goldreich, M. Naor, Adaptively secure multi-party computation, in: 28th Annual ACM Symposium on Theory of Computing (STOC), 1996, pp. 639-648
  • 12
    • 0022082037 scopus 로고
    • A simple and efficient randomized Byzantine agreement algorithm
    • Chor B., and Coan B. A simple and efficient randomized Byzantine agreement algorithm. IEEE Trans. Softw. Eng. 11 6 (1985) 531-539
    • (1985) IEEE Trans. Softw. Eng. , vol.11 , Issue.6 , pp. 531-539
    • Chor, B.1    Coan, B.2
  • 13
    • 0022199386 scopus 로고    scopus 로고
    • B. Chor, S. Goldwasser, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in: 26th Annual IEEE Symposium on the Foundations of Computer Science (FOCS), 1985, pp. 383-395
    • B. Chor, S. Goldwasser, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in: 26th Annual IEEE Symposium on the Foundations of Computer Science (FOCS), 1985, pp. 383-395
  • 14
    • 84957717648 scopus 로고    scopus 로고
    • Efficient multiparty computations secure against an adaptive adversary
    • Advances in Cryptology - Eurocrypt '99, Springer-Verlag
    • Cramer R., Damgård I., Dziembowski S., Hirt M., and Rabin T. Efficient multiparty computations secure against an adaptive adversary. Advances in Cryptology - Eurocrypt '99. Lecture Notes in Comput. Sci. vol. 1592 (1999), Springer-Verlag 311-326
    • (1999) Lecture Notes in Comput. Sci. , vol.1592 , pp. 311-326
    • Cramer, R.1    Damgård, I.2    Dziembowski, S.3    Hirt, M.4    Rabin, T.5
  • 15
    • 33745124039 scopus 로고    scopus 로고
    • Constant-round multiparty computation using a black-box pseudorandom generator
    • Advances in Cryptology - Crypto 2005, Springer-Verlag
    • Damgård I., and Ishai Y. Constant-round multiparty computation using a black-box pseudorandom generator. Advances in Cryptology - Crypto 2005. Lecture Notes in Comput. Sci. vol. 3621 (2005), Springer-Verlag 378-394
    • (2005) Lecture Notes in Comput. Sci. , vol.3621 , pp. 378-394
    • Damgård, I.1    Ishai, Y.2
  • 16
    • 0001683636 scopus 로고
    • Authenticated algorithms for Byzantine agreement
    • Dolev D., and Strong H. Authenticated algorithms for Byzantine agreement. SIAM J. Comput. 12 4 (1983) 656-666
    • (1983) SIAM J. Comput. , vol.12 , Issue.4 , pp. 656-666
    • Dolev, D.1    Strong, H.2
  • 17
    • 0025448931 scopus 로고
    • Flipping persuasively in constant time
    • Dwork C., Shmoys D., and Stockmeyer L. Flipping persuasively in constant time. SIAM J. Comput. 19 3 (1990) 472-499
    • (1990) SIAM J. Comput. , vol.19 , Issue.3 , pp. 472-499
    • Dwork, C.1    Shmoys, D.2    Stockmeyer, L.3
  • 18
    • 58149161815 scopus 로고    scopus 로고
    • P. Feldman, Optimal algorithms for Byzantine agreement, PhD thesis, Massachusetts Institute of Technology, 1988
    • P. Feldman, Optimal algorithms for Byzantine agreement, PhD thesis, Massachusetts Institute of Technology, 1988
  • 19
    • 0022185625 scopus 로고    scopus 로고
    • P. Feldman, S. Micali, Byzantine agreement in constant expected time (and trusting no one), in: 26th Annual IEEE Symposium on the Foundations of Computer Science (FOCS), 1985, pp. 267-276
    • P. Feldman, S. Micali, Byzantine agreement in constant expected time (and trusting no one), in: 26th Annual IEEE Symposium on the Foundations of Computer Science (FOCS), 1985, pp. 267-276
  • 20
    • 0031210863 scopus 로고    scopus 로고
    • An optimal probabilistic protocol for synchronous Byzantine agreement
    • Feldman P., and Micali S. An optimal probabilistic protocol for synchronous Byzantine agreement. SIAM J. Comput. 26 4 (1997) 873-933
    • (1997) SIAM J. Comput. , vol.26 , Issue.4 , pp. 873-933
    • Feldman, P.1    Micali, S.2
  • 21
    • 0000613943 scopus 로고
    • A lower bound for the time to assure interactive consistency
    • Fischer M.J., and Lynch N.A. A lower bound for the time to assure interactive consistency. Inform. Process. Lett. 14 4 (1982) 183-186
    • (1982) Inform. Process. Lett. , vol.14 , Issue.4 , pp. 183-186
    • Fischer, M.J.1    Lynch, N.A.2
  • 22
    • 1142293099 scopus 로고    scopus 로고
    • M. Fitzi, J. Garay, Efficient player-optimal protocols for strong and differential consensus, in: 22nd Annual ACM Symposium on Principles of Distributed Computing (PODC), 2003, pp. 211-220
    • M. Fitzi, J. Garay, Efficient player-optimal protocols for strong and differential consensus, in: 22nd Annual ACM Symposium on Principles of Distributed Computing (PODC), 2003, pp. 211-220
  • 23
    • 33745550878 scopus 로고    scopus 로고
    • Round-optimal and efficient verifiable secret sharing
    • 3rd Theory of Cryptography Conference (TCC), Springer-Verlag
    • Fitzi M., Garay J., Gollakota S., Rangan C.P., and Srinathan K. Round-optimal and efficient verifiable secret sharing. 3rd Theory of Cryptography Conference (TCC). Lecture Notes in Comput. Sci. vol. 3876 (2006), Springer-Verlag 329-342
    • (2006) Lecture Notes in Comput. Sci. , vol.3876 , pp. 329-342
    • Fitzi, M.1    Garay, J.2    Gollakota, S.3    Rangan, C.P.4    Srinathan, K.5
  • 24
    • 0033702889 scopus 로고    scopus 로고
    • M. Fitzi, U. Maurer, From partial consistency to global broadcast, in: 32nd Annual ACM Symposium on Theory of Computing (STOC), 2000, pp. 494-503
    • M. Fitzi, U. Maurer, From partial consistency to global broadcast, in: 32nd Annual ACM Symposium on Theory of Computing (STOC), 2000, pp. 494-503
  • 25
    • 46749153857 scopus 로고    scopus 로고
    • J. Garay, J. Katz, C.-Y. Koo, R. Ostrovsky, Round complexity of authenticated broadcast with a dishonest majority, in: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2007, pp. 658-668
    • J. Garay, J. Katz, C.-Y. Koo, R. Ostrovsky, Round complexity of authenticated broadcast with a dishonest majority, in: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2007, pp. 658-668
  • 26
    • 0012525797 scopus 로고    scopus 로고
    • Fully polynomial Byzantine agreement for n > 3 t processors in t + 1 rounds
    • Garay J.A., and Moses Y. Fully polynomial Byzantine agreement for n > 3 t processors in t + 1 rounds. SIAM J. Comput. 27 1 (1998) 247-290
    • (1998) SIAM J. Comput. , vol.27 , Issue.1 , pp. 247-290
    • Garay, J.A.1    Moses, Y.2
  • 27
    • 0034830283 scopus 로고    scopus 로고
    • R. Gennaro, Y. Ishai, E. Kushilevitz, T. Rabin, The round complexity of verifiable secret sharing and secure multicast, in: 33rd Annual ACM Symposium on Theory of Computing (STOC), 2001, pp. 580-589
    • R. Gennaro, Y. Ishai, E. Kushilevitz, T. Rabin, The round complexity of verifiable secret sharing and secure multicast, in: 33rd Annual ACM Symposium on Theory of Computing (STOC), 2001, pp. 580-589
  • 29
    • 22344432877 scopus 로고    scopus 로고
    • Secure computation without agreement
    • Goldwasser S., and Lindell Y. Secure computation without agreement. J. Cryptology 18 3 (2005) 247-287
    • (2005) J. Cryptology , vol.18 , Issue.3 , pp. 247-287
    • Goldwasser, S.1    Lindell, Y.2
  • 30
    • 38749153587 scopus 로고    scopus 로고
    • S. Goldwasser, E. Pavlov, V. Vaikuntanathan, Fault-tolerant distributed computing in full-information networks, in: 47th Anuual IEEE Symposium on Foundations of Computer Science (FOCS), 2006, pp. 15-26
    • S. Goldwasser, E. Pavlov, V. Vaikuntanathan, Fault-tolerant distributed computing in full-information networks, in: 47th Anuual IEEE Symposium on Foundations of Computer Science (FOCS), 2006, pp. 15-26
  • 31
    • 32344443727 scopus 로고    scopus 로고
    • A. Hevia, D. Micciancio, Simultaneous broadcast revisited, in: 24th ACM Symposium on Principles of Distributed Computing (PODC), 2005, pp. 324-333
    • A. Hevia, D. Micciancio, Simultaneous broadcast revisited, in: 24th ACM Symposium on Principles of Distributed Computing (PODC), 2005, pp. 324-333
  • 32
    • 38049161810 scopus 로고    scopus 로고
    • Round-efficient secure computation in point-to-point networks
    • Advances in Cryptology - Eurocrypt 2007, Springer-Verlag
    • Katz J., and Koo C.-Y. Round-efficient secure computation in point-to-point networks. Advances in Cryptology - Eurocrypt 2007. Lecture Notes in Comput. Sci. vol. 4515 (2007), Springer-Verlag 311-328
    • (2007) Lecture Notes in Comput. Sci. , vol.4515 , pp. 311-328
    • Katz, J.1    Koo, C.-Y.2
  • 33
    • 49049095073 scopus 로고    scopus 로고
    • Improving the round complexity of VSS in point-to-point networks
    • 35th International Colloquium on Automata, Languages and Programming (ICALP), Springer-Verlag
    • Katz J., Koo C.-Y., and Kumaresan R. Improving the round complexity of VSS in point-to-point networks. 35th International Colloquium on Automata, Languages and Programming (ICALP). Lecture Notes in Comput. Sci. vol. 5126 (2008), Springer-Verlag 499-510
    • (2008) Lecture Notes in Comput. Sci. , vol.5126 , pp. 499-510
    • Katz, J.1    Koo, C.-Y.2    Kumaresan, R.3
  • 34
    • 33748109704 scopus 로고    scopus 로고
    • E. Kushilevitz, Y. Lindell, T. Rabin, Information-theoretically secure protocols and security under composition, in: 38th Annual ACM Symposium on Theory of Computing (STOC), 2006, pp. 109-118
    • E. Kushilevitz, Y. Lindell, T. Rabin, Information-theoretically secure protocols and security under composition, in: 38th Annual ACM Symposium on Theory of Computing (STOC), 2006, pp. 109-118
  • 36
    • 0036038649 scopus 로고    scopus 로고
    • Y. Lindell, A. Lysyanskaya, T. Rabin, On the composition of authenticated Byzantine agreement, in: 34th Annual ACM Symposium on Theory of Computing (STOC), 2002, pp. 514-523
    • Y. Lindell, A. Lysyanskaya, T. Rabin, On the composition of authenticated Byzantine agreement, in: 34th Annual ACM Symposium on Theory of Computing (STOC), 2002, pp. 514-523
  • 37
    • 0036957660 scopus 로고    scopus 로고
    • Y. Lindell, A. Lysyanskaya, T. Rabin, Sequential composition of protocols without simultaneous termination, in: 21st Annual ACM Symposium on Principles of Distributed Computing (PODC), 2002, pp. 203-212
    • Y. Lindell, A. Lysyanskaya, T. Rabin, Sequential composition of protocols without simultaneous termination, in: 21st Annual ACM Symposium on Principles of Distributed Computing (PODC), 2002, pp. 203-212
  • 38
    • 84937429269 scopus 로고    scopus 로고
    • A threshold pseudorandom function construction and its applications
    • Advances in Cryptology - Crypto 2002, Springer-Verlag
    • Nielsen J.B. A threshold pseudorandom function construction and its applications. Advances in Cryptology - Crypto 2002. Lecture Notes in Comput. Sci. vol. 2442 (2002), Springer-Verlag 401-416
    • (2002) Lecture Notes in Comput. Sci. , vol.2442 , pp. 401-416
    • Nielsen, J.B.1
  • 39
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • Pease M., Shostak R., and Lamport L. Reaching agreement in the presence of faults. J. ACM 27 2 (1980) 228-234
    • (1980) J. ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 40
    • 58149175909 scopus 로고    scopus 로고
    • B. Pfitzmann, M. Waidner, Information-theoretic pseudosignatures and Byzantine agreement for t ≥ n / 3, Technical Report RZ 2882 (#90830), IBM Research, 1996
    • B. Pfitzmann, M. Waidner, Information-theoretic pseudosignatures and Byzantine agreement for t ≥ n / 3, Technical Report RZ 2882 (#90830), IBM Research, 1996
  • 41
    • 0020881178 scopus 로고    scopus 로고
    • M. Rabin, Randomized Byzantine generals, in: 24th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 1983, pp. 403-409
    • M. Rabin, Randomized Byzantine generals, in: 24th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 1983, pp. 403-409
  • 42
    • 0025152622 scopus 로고    scopus 로고
    • J. Rompel, One-way functions are necessary and sufficient for secure signatures, in: 22nd Annual ACM Symposium on Theory of Computing (STOC), 1990, pp. 387-394
    • J. Rompel, One-way functions are necessary and sufficient for secure signatures, in: 22nd Annual ACM Symposium on Theory of Computing (STOC), 1990, pp. 387-394
  • 43
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Comm. ACM 22 11 (1979) 612-613
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 44
    • 0021650338 scopus 로고    scopus 로고
    • S. Toueg, Randomized Byzantine agreements, in: 3rd Annual ACM Symposium on Principles of Distributed Computing (PODC), 1984, pp. 163-178
    • S. Toueg, Randomized Byzantine agreements, in: 3rd Annual ACM Symposium on Principles of Distributed Computing (PODC), 1984, pp. 163-178
  • 45
    • 0021372186 scopus 로고
    • Extending binary Byzantine agreement to multivalued Byzantine agreement
    • available at
    • Turpin R., and Coan B. Extending binary Byzantine agreement to multivalued Byzantine agreement. Inform. Process. Lett. 18 2 (1984) 73-76. http://publications.csail.mit.edu/lcs/specpub.php?id=883 available at
    • (1984) Inform. Process. Lett. , vol.18 , Issue.2 , pp. 73-76
    • Turpin, R.1    Coan, B.2
  • 46
    • 58149158018 scopus 로고    scopus 로고
    • M. Waidner, Byzantinische Verteilung ohne Kryptographische Annahmen trotz Beliebig Vieler Fehler, PhD thesis, University of Karlsruhe, 1991 (in German)
    • M. Waidner, Byzantinische Verteilung ohne Kryptographische Annahmen trotz Beliebig Vieler Fehler, PhD thesis, University of Karlsruhe, 1991 (in German)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.