메뉴 건너뛰기




Volumn , Issue , 2010, Pages 420-429

Breaking the O(n2) bit barrier: Scalable Byzantine agreement with an adaptive adversary

Author keywords

Byzantine agreement; Consensus; Distributed computing; Monte carlo algorithms; Peer to peer; Samplers; Secretsharing

Indexed keywords

BYZANTINE AGREEMENT; CONSENSUS; DISTRIBUTED COMPUTING; MONTE CARLO ALGORITHMS; PEER TO PEER; SAMPLERS; SECRETSHARING;

EID: 77956253063     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1835698.1835798     Document Type: Conference Paper
Times cited : (41)

References (27)
  • 1
    • 33748686155 scopus 로고    scopus 로고
    • Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
    • Ittai Abraham, Danny Dolev, Rica Gonen, and Joe Halper. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In Principles of Distributed Computing(PODC), 2006.
    • (2006) Principles of Distributed Computing(PODC)
    • Abraham, I.1    Dolev, D.2    Gonen, R.3    Halper, J.4
  • 6
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine fault tolerance and proactive recovery
    • M. Castro and B. Liskov. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 20(4):398-461, 2002.
    • (2002) ACM Transactions on Computer Systems (TOCS) , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 7
    • 0022198802 scopus 로고
    • The bit extraction problem of t-resilient functions
    • (preliminary version).IEEE
    • Benny Chor, Oded Goldreich, Johan Håstad, Joel Friedman, Steven Rudich, and Roman Smolensky. The bit extraction problem of t-resilient functions (preliminary version). In FOCS, pages 396-407. IEEE, 1985.
    • (1985) FOCS , pp. 396-407
    • Chor, B.1    Goldreich, O.2    Håstad, J.3    Friedman, J.4    Rudich, S.5    Smolensky, R.6
  • 11
    • 0021976090 scopus 로고
    • Bounds on information exchange for Byzantine agreement
    • Danny Dolev and R̈udiger Reischuk. Bounds on information exchange for Byzantine agreement. J. ACM, 32(1):191-204, 1985.
    • (1985) J. ACM , vol.32 , Issue.1 , pp. 191-204
    • Dolev, D.1    Reischuk, R.2
  • 13
    • 44449163037 scopus 로고    scopus 로고
    • Almost-everywhere secure computation
    • Juan A. Garay and Rafail Ostrovsky. Almost-everywhere secure computation. In EUROCRYPT, pages 307-323, 2008.
    • (2008) EUROCRYPT , pp. 307-323
    • Garay, J.A.1    Ostrovsky, R.2
  • 14
    • 51649126675 scopus 로고    scopus 로고
    • Lower bound for scalable Byzantine agreement
    • Dan Holtby, Bruce M. Kapron, and Valerie King. Lower bound for scalable Byzantine agreement. Distributed Computing, 21(4):239-248, 2008.
    • (2008) Distributed Computing , vol.21 , Issue.4 , pp. 239-248
    • Holtby, D.1    Kapron, B.M.2    King, V.3
  • 22
    • 0030703957 scopus 로고    scopus 로고
    • Unreliable intrusion detection in distributed computations
    • Dahlia Malkhi and Michael Reiter. Unreliable intrusion detection in distributed computations. In In Computer Security Foundations Workshop, pages 116-124, 1997.
    • (1997) Computer Security Foundations Workshop , pp. 116-124
    • Malkhi, D.1    Reiter, M.2
  • 23
    • 0019608784 scopus 로고
    • On sharing secrets and reed-solomon codes
    • R. J. McEliece and D. V. Sarwate. On sharing secrets and reed-solomon codes. Commun. ACM, 24(9):583-584, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.9 , pp. 583-584
    • McEliece, R.J.1    Sarwate, D.V.2
  • 26
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • E. Shi, A. Perrig, et al. Designing secure sensor networks. IEEE Wireless Communications, 11(6):38-43, 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 27
    • 67650067144 scopus 로고    scopus 로고
    • Contemporary approaches to fault tolerance
    • A. Wright. Contemporary approaches to fault tolerance. Communications of the ACM, 52(7):13-15, 2009.
    • (2009) Communications of the ACM , vol.52 , Issue.7 , pp. 13-15
    • Wright, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.