메뉴 건너뛰기




Volumn , Issue , 2010, Pages 263-272

Practical robust communication in DHTs tolerating a byzantine adversary

Author keywords

[No Author keywords available]

Indexed keywords

ANALYTICAL RESULTS; ASYMPTOTIC NOTATION; BYZANTINE FAULT; COMMUNICATION COST; DATA RETRIEVAL; DISTRIBUTED HASH TABLES; DISTRIBUTED KEY GENERATION; MESSAGE COMPLEXITY; MESSAGE SENDING; MICROBENCHMARKS; PLANETLAB; REAL-WORLD APPLICATION; ROBUST COMMUNICATION; SETUP COSTS; THRESHOLD CRYPTOGRAPHY; TRUSTED THIRD PARTIES;

EID: 77955963220     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2010.31     Document Type: Conference Paper
Times cited : (22)

References (50)
  • 2
    • 67650307031 scopus 로고    scopus 로고
    • A Survey of Peer-to-Peer Security Issues
    • D. S.Wallach, "A Survey of Peer-to-Peer Security Issues," in ISSS, 2002, pp. 253-258.
    • (2002) ISSS , pp. 253-258
    • Wallach, D.S.1
  • 6
    • 39049150287 scopus 로고    scopus 로고
    • A Comparative Study of the DNS Design with DHT-Based Alternatives
    • V. Pappas, D. Massey, A. Terzis, and L. Zhang, "A Comparative Study of the DNS Design with DHT-Based Alternatives," in INFOCOM, 2006, pp. 1-13.
    • (2006) INFOCOM , pp. 1-13
    • Pappas, V.1    Massey, D.2    Terzis, A.3    Zhang, L.4
  • 7
    • 33749571809 scopus 로고    scopus 로고
    • Towards a Scalable and Robust DHT
    • B. Awerbuch and C. Scheideler, "Towards a Scalable and Robust DHT," in SPAA, 2006, pp. 318-327.
    • (2006) SPAA , pp. 318-327
    • Awerbuch, B.1    Scheideler, C.2
  • 8
    • 77949599896 scopus 로고    scopus 로고
    • Towards Scalable and Robust Overlay Networks
    • -, "Towards Scalable and Robust Overlay Networks," in IPTPS, 2007.
    • (2007) IPTPS
    • Awerbuch, B.1    Scheideler, C.2
  • 9
    • 84885718443 scopus 로고    scopus 로고
    • Robust Random Number Generation for Peer-to-Peer Systems
    • -, "Robust Random Number Generation for Peer-to-Peer Systems," in OPODIS, 2006, pp. 275-289.
    • (2006) OPODIS , pp. 275-289
    • Awerbuch, B.1    Scheideler, C.2
  • 10
    • 40849100435 scopus 로고    scopus 로고
    • Reducing Communication Costs in Robust Peer-to-Peer Networks
    • J. Saia and M. Young, "Reducing Communication Costs in Robust Peer-to-Peer Networks," Information Processing Letters, vol. 106(4), pp. 152-158, 2008.
    • (2008) Information Processing Letters , vol.106 , Issue.4 , pp. 152-158
    • Saia, J.1    Young, M.2
  • 11
    • 27144478012 scopus 로고    scopus 로고
    • Making Chord Robust to Byzantine Attacks
    • A. Fiat, J. Saia, and M. Young, "Making Chord Robust to Byzantine Attacks," in ESA, 2005, pp. 803-814.
    • (2005) ESA , pp. 803-814
    • Fiat, A.1    Saia, J.2    Young, M.3
  • 12
    • 34248566417 scopus 로고    scopus 로고
    • A Simple Fault Tolerant Distributed Hash Table
    • M. Naor and U. Wieder, "A Simple Fault Tolerant Distributed Hash Table," in IPTPS, 2003, pp. 88-97.
    • (2003) IPTPS , pp. 88-97
    • Naor, M.1    Wieder, U.2
  • 13
    • 35248832638 scopus 로고    scopus 로고
    • Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-peer Networks
    • K. Hildrum and J. Kubiatowicz, "Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-peer Networks," in DISC, 2004, pp. 321-336.
    • (2004) DISC , pp. 321-336
    • Hildrum, K.1    Kubiatowicz, J.2
  • 14
    • 34748899427 scopus 로고    scopus 로고
    • Fireflies: Scalable Support for Intrusion-Tolerant Network Overlays
    • H. Johansen, A. Allavena, and R. van Renesse, "Fireflies: Scalable Support for Intrusion-Tolerant Network Overlays," in OSR, 2006, pp. 3-13.
    • (2006) OSR , pp. 3-13
    • Johansen, H.1    Allavena, A.2    Van Renesse, R.3
  • 15
    • 4544304744 scopus 로고    scopus 로고
    • The Sybil Attack
    • J. Douceur, "The Sybil Attack," in IPTPS, 2002.
    • (2002) IPTPS
    • Douceur, J.1
  • 17
    • 0034782005 scopus 로고    scopus 로고
    • Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications
    • I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, "Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications," in SIGCOMM, 2001, pp. 149-160.
    • (2001) SIGCOMM , pp. 149-160
    • Stoica, I.1    Morris, R.2    Karger, D.3    Kaashoek, M.F.4    Balakrishnan, H.5
  • 19
    • 0025564050 scopus 로고
    • Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial
    • F. B. Schneider, "Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial," ACM Computing Surveys, vol. 22(4), pp. 299-319, 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.4 , pp. 299-319
    • Schneider, F.B.1
  • 21
    • 0035789194 scopus 로고    scopus 로고
    • Byzantine Fault Tolerance Can Be Fast
    • M. Castro and B. Liskov, "Byzantine Fault Tolerance Can Be Fast," in DSN, 2001, pp. 513-518.
    • (2001) DSN , pp. 513-518
    • Castro, M.1    Liskov, B.2
  • 22
    • 0036921939 scopus 로고    scopus 로고
    • Secure Intrusion-tolerant Replication on the Internet
    • C. Cachin and J. Poritz, "Secure Intrusion-tolerant Replication on the Internet," in DSN, 2002, pp. 167-176.
    • (2002) DSN , pp. 167-176
    • Cachin, C.1    Poritz, J.2
  • 25
    • 85009705400 scopus 로고    scopus 로고
    • HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance
    • J. Cowling, D. Myers, B. Liskov, R. Rodrigues, and L. Shrira, "HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance," in OSDI, 1999, pp. 177-190.
    • (1999) OSDI , pp. 177-190
    • Cowling, J.1    Myers, D.2    Liskov, B.3    Rodrigues, R.4    Shrira, L.5
  • 28
    • 76949085683 scopus 로고    scopus 로고
    • Large-Scale Byzantine Fault Tolerance: Safe but Not Always Live
    • R. Rodrigues, P. Kouznetsov, and B. Bhattacharjee, "Large-Scale Byzantine Fault Tolerance: Safe but Not Always Live," in HotDep, 2007.
    • (2007) HotDep
    • Rodrigues, R.1    Kouznetsov, P.2    Bhattacharjee, B.3
  • 31
    • 84978382732 scopus 로고    scopus 로고
    • Secure Routing for Structured Peer-to-Peer Overlay Networks
    • M. Castro, P.Druschel, A.Ganesh, A. Rowstron, and D.Wallach, "Secure Routing for Structured Peer-to-Peer Overlay Networks," in OSDI, 2002, pp. 299-314.
    • (2002) OSDI , pp. 299-314
    • Castro, M.1    Druschel, P.2    Ganesh, A.3    Rowstron, A.4    Wallach, D.5
  • 32
    • 85180784621 scopus 로고    scopus 로고
    • Halo: High-Assurance Locate for Distributed Hash Tables
    • A. Kapadia and N. Triandopoulos, "Halo: High-Assurance Locate for Distributed Hash Tables," in NDSS, 2008.
    • (2008) NDSS
    • Kapadia, A.1    Triandopoulos, N.2
  • 33
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A Structured Approach to Large-Scale Anonymity
    • A. Nambiar and M. Wright, "Salsa: A Structured Approach to Large-Scale Anonymity," in CCS, 2006, pp. 17-26.
    • (2006) CCS , pp. 17-26
    • Nambiar, A.1    Wright, M.2
  • 34
    • 74049096681 scopus 로고    scopus 로고
    • Shadow Walker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies
    • P. Mittal and N. Borisov, "Shadow Walker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies," in CCS, 2009.
    • (2009) CCS
    • Mittal, P.1    Borisov, N.2
  • 35
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine Fault Tolerance and Proactive Recovery
    • M. Castro and B. Liskov, "Practical Byzantine Fault Tolerance and Proactive Recovery," ACM Transactions on Computer Systems, vol. 20(4), pp. 398-461, 2002.
    • (2002) ACM Transactions on Computer Systems , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 36
    • 84946840347 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairing
    • D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," in ASIACRYPT, 2001, pp. 514-532.
    • (2001) ASIACRYPT , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 37
    • 0023538330 scopus 로고
    • A Practical Scheme for Non-Interactive Verifiable Secret Sharing
    • P. Feldman, "A Practical Scheme for Non-Interactive Verifiable Secret Sharing," in FOCS, 1987, pp. 427-437.
    • (1987) FOCS , pp. 427-437
    • Feldman, P.1
  • 38
    • 84982943258 scopus 로고
    • Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
    • T. P. Pedersen, "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing," in CRYPTO, 1991, pp. 129-140.
    • (1991) CRYPTO , pp. 129-140
    • Pedersen, T.P.1
  • 39
    • 35248880074 scopus 로고    scopus 로고
    • Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
    • A. Boldyreva, "Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme," in PKC, 2003, pp. 31-46.
    • (2003) PKC , pp. 31-46
    • Boldyreva, A.1
  • 40
    • 70350216066 scopus 로고    scopus 로고
    • Distributed Key Generation for the Internet
    • A. Kate and I. Goldberg, "Distributed Key Generation for the Internet," in ICDCS, 2009, pp. 119-128.
    • (2009) ICDCS , pp. 119-128
    • Kate, A.1    Goldberg, I.2
  • 41
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," in EUROCRYPT, 2003, pp. 416-432.
    • (2003) EUROCRYPT , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 42
    • 0037717696 scopus 로고    scopus 로고
    • Passive Estimation of TCP Round-Trip Times
    • H. Jiang and C. Dovrolis, "Passive Estimation of TCP Round-Trip Times," CCR, vol. 32, pp. 75-88, 2002.
    • (2002) CCR , vol.32 , pp. 75-88
    • Jiang, H.1    Dovrolis, C.2
  • 43
    • 33645759275 scopus 로고    scopus 로고
    • A Blueprint for Introducing Disruptive Technology into the Internet
    • L. Peterson, T. Anderson, D. Culler, and T. Roscoe, "A Blueprint for Introducing Disruptive Technology into the Internet," CCR, vol. 33, no. 1, pp. 59-64, 2003.
    • (2003) CCR , vol.33 , Issue.1 , pp. 59-64
    • Peterson, L.1    Anderson, T.2    Culler, D.3    Roscoe, T.4
  • 44
    • 77955972226 scopus 로고    scopus 로고
    • Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography
    • Report 355
    • A. Kate and I. Goldberg, "Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography," Cryptology ePrint Archive, Report 355, 2009.
    • (2009) Cryptology ePrint Archive
    • Kate, A.1    Goldberg, I.2
  • 47
    • 21644443485 scopus 로고    scopus 로고
    • Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload
    • P. K. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, and J. Zahorjan, "Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload," in SOSP, 2003, pp. 314-329.
    • (2003) SOSP , pp. 314-329
    • Gummadi, P.K.1    Dunn, R.J.2    Saroiu, S.3    Gribble, S.D.4    Levy, H.M.5    Zahorjan, J.6
  • 48
    • 0037880330 scopus 로고    scopus 로고
    • A Measurement Study of Peer-to-Peer File Sharing Systems
    • S. Saroiu, P. K. Gummadi, and S. D. Gribble, "A Measurement Study of Peer-to-Peer File Sharing Systems," in MMCN, 2002, pp. 314-329.
    • (2002) MMCN , pp. 314-329
    • Saroiu, S.1    Gummadi, P.K.2    Gribble, S.D.3
  • 49
    • 34748819854 scopus 로고    scopus 로고
    • An Experimental Study of the Skype Peer-to-Peer VoIP System
    • S.Guha, N.Daswani, and R. Jain, "An Experimental Study of the Skype Peer-to-Peer VoIP System," in IPTPS, 2006.
    • (2006) IPTPS
    • Guha, S.1    Daswani, N.2    Jain, R.3
  • 50
    • 0036957999 scopus 로고    scopus 로고
    • Analysis of the Evolution of Peer-to-Peer Systems
    • D. Liben-Nowell, H. Balakrishnan, and D. Karger, "Analysis of the Evolution of Peer-to-Peer Systems," in PODC, 2002, pp. 233-242.
    • (2002) PODC , pp. 233-242
    • Liben-Nowell, D.1    Balakrishnan, H.2    Karger, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.