메뉴 건너뛰기




Volumn 58, Issue 4, 2011, Pages

Breaking the O(n2) bit barrier: Scalable byzantine agreement with an adaptive adversary

Author keywords

Byzantine agreement; Consensus; Distributed computing; Monte carlo algorithms; Peer to peer; Samplers; Secret sharing

Indexed keywords

BYZANTINE AGREEMENT; CONSENSUS; MONTE CARLO ALGORITHMS; PEER TO PEER; SAMPLERS; SECRET-SHARING;

EID: 79960819698     PISSN: 00045411     EISSN: 1557735X     Source Type: Journal    
DOI: 10.1145/1989727.1989732     Document Type: Conference Paper
Times cited : (103)

References (29)
  • 3
    • 77956256927 scopus 로고    scopus 로고
    • Coordinated Science Laboratory, Tech. rep. no. UILU-ENG- 03-2228 (CRHC-03-14), University of Illinois at, Urbana-Champaign
    • AGBARIA, A. AND FRIEDMAN, R. 2003. Overcoming Byzantine Failures Using Checkpointing. Coordinated Science Laboratory, Tech. rep. no. UILU-ENG-03-2228 (CRHC-03-14), University of Illinois at Urbana-Champaign.
    • (2003) Overcoming Byzantine Failures Using Checkpointing
    • Agbaria, A.1    Friedman, R.2
  • 6
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine Fault Tolerance and Proactive Recovery
    • DOI 10.1145/571637.571640
    • CASTRO, M. AND LISKOV, B. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20, 4, 398-461. (Pubitemid 135702591)
    • (2002) ACM Transactions on Computer Systems , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 7
    • 54349113051 scopus 로고    scopus 로고
    • The anatomy study of server-initial agreement for general hierarchy wired/wireless networks
    • CHENG, C.-F., WANG, S.-C., AND LIANG, T. 2009. The anatomy study of server-initial agreement for general hierarchy wired/wireless networks. Comput. Stand. Interfaces 31, 1, 219-226.
    • (2009) Comput. Stand. Interfaces , vol.31 , Issue.1 , pp. 219-226
    • Cheng, C.-F.1    Wang, S.-C.2    Liang, T.3
  • 12
    • 0021976090 scopus 로고
    • Bounds on information exchange for byzantine agreement
    • DOI 10.1145/2455.214112
    • DOLEV, D. AND REISCHUK, R. 1985. Bounds on information exchange for Byzantine agreement. J. ACM 32, 1, 191-204. (Pubitemid 15599045)
    • (1985) Journal of the ACM , vol.32 , Issue.1 , pp. 191-204
    • Dolev, D.1    Reischuk, R.2
  • 15
    • 51649126675 scopus 로고    scopus 로고
    • Lower bound for scalable byzantine agreement
    • HOLTBY, D., KAPRON, B. M., AND KING, V. 2008. Lower bound for scalable byzantine agreement. Distrib. Comput. 21, 4, 239-248.
    • (2008) Distrib. Comput. , vol.21 , Issue.4 , pp. 239-248
    • Holtby, D.1    Kapron, B.M.2    King, V.3
  • 16
    • 77956233802 scopus 로고    scopus 로고
    • On concentration of probability
    • JANSON, S. 1999. On concentration of probability. Combinat. Probabil. Comput. 11, 2002.
    • (1999) Combinat. Probabil. Comput. , vol.11 , pp. 2002
    • Janson, S.1
  • 17
  • 24
    • 0019608784 scopus 로고
    • On sharing secrets and reed-solomon codes
    • MCELIECE, R. J. AND SARWATE, D. V. 1981. On sharing secrets and reed-solomon codes. Comm. ACM 24, 9, 583-584.
    • (1981) Comm. ACM , vol.24 , Issue.9 , pp. 583-584
    • McEliece, R.J.1    Sarwate, D.V.2
  • 27
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • DOI 10.1109/MWC.2004.1368895
    • SHI, E. AND PERRIG, A. 2004. Designing secure sensor networks. IEEE Wirel. Comm. 11, 6, 38-43. (Pubitemid 40021188)
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 28
    • 67650067144 scopus 로고    scopus 로고
    • Contemporary approaches to fault tolerance
    • WRIGHT, A. 2009. Contemporary approaches to fault tolerance. Comm. ACM 52, 7, 13-15.
    • (2009) Comm. ACM , vol.52 , Issue.7 , pp. 13-15
    • Wright, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.