-
1
-
-
84976699318
-
The byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease, "The byzantine generals problem", ACM Transactions on Programming Languages and Systems (TOPLAS'82), vol. 4, no. 3, pp. 382-401, 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems (TOPLAS'82)
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
2
-
-
0034771832
-
Practical multi-candidate election system
-
O. Baudron, P.A. Fouque, D. Pointcheval, J. Stern, and G. Poupard, "Practical Multi-Candidate Election System", in 20th annual ACM symposium on Principles of distributed computing (PODC'01), 2001, pp. 274-283.
-
(2001)
20th Annual ACM Symposium on Principles of Distributed Computing (PODC'01)
, pp. 274-283
-
-
Baudron, O.1
Fouque, P.A.2
Pointcheval, D.3
Stern, J.4
Poupard, G.5
-
3
-
-
0023545076
-
How to play any mental game
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game", in 19th annual ACM symposium on Theory of computing (STOC'87), 1987, pp. 218-229.
-
(1987)
19th Annual ACM Symposium on Theory of Computing (STOC'87)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
4
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation", in 20th annual ACM symposium on Theory of computing (STOC'88), 1988, pp. 1-10.
-
(1988)
20th Annual ACM Symposium on Theory of Computing (STOC'88)
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
6
-
-
0001683636
-
Authenticated algorithms for byzantine agreement
-
D. Dolev and H. R. Strong, "Authenticated algorithms for byzantine agreement", SIAM Journal on Computing, vol. 12, no. 4, pp. 656-666, 1983.
-
(1983)
SIAM Journal on Computing
, vol.12
, Issue.4
, pp. 656-666
-
-
Dolev, D.1
Strong, H.R.2
-
7
-
-
0021976090
-
Bounds on information exchange for byzantine agreement
-
Jan.
-
Danny Dolev and Rüdiger Reischuk, "Bounds on information exchange for byzantine agreement", J. ACM, vol. 32, no. 1, pp. 191-204, Jan. 1985.
-
(1985)
J. ACM
, vol.32
, Issue.1
, pp. 191-204
-
-
Dolev, D.1
Reischuk, R.2
-
8
-
-
67449124556
-
Towards a scalable and robust DHT
-
B. Awerbuch and C. Scheideler, "Towards a Scalable and Robust DHT", Theory of Computing Systems, vol. 45, no. 2, pp. 234-260, 2009.
-
(2009)
Theory of Computing Systems
, vol.45
, Issue.2
, pp. 234-260
-
-
Awerbuch, B.1
Scheideler, C.2
-
9
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
I. Damg ard and M. Jurik, "A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System", in Public Key Cryptography (PKC'01), 2001, pp. 119-136.
-
(2001)
Public Key Cryptography (PKC'01)
, pp. 119-136
-
-
Damg Ard, I.1
Jurik, M.2
-
10
-
-
76649119750
-
From almost everywhere to everywhere: Byzantine agreement with -o(n3/2) bits
-
V. King and J. Saia, "From almost everywhere to everywhere: Byzantine agreement with -o(n3/2) bits", Distributed Computing, pp. 464-478, 2009.
-
(2009)
Distributed Computing
, pp. 464-478
-
-
King, V.1
Saia, J.2
-
11
-
-
51649126675
-
Lower bound for scalable byzantine agreement
-
D. Holtby, B.M. Kapron, and V. King, "Lower bound for scalable byzantine agreement", Distributed Computing, vol. 21, no. 4, pp. 239-248, 2008.
-
(2008)
Distributed Computing
, vol.21
, Issue.4
, pp. 239-248
-
-
Holtby, D.1
Kapron, B.M.2
King, V.3
-
12
-
-
84978371883
-
An integrated experimental environment for distributed systems and networks
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar, "An integrated experimental environment for distributed systems and networks", in 5th Symposium on Operating Systems Dessign and Implementation (OSDI'02), 2002, pp. 255-270.
-
(2002)
5th Symposium on Operating Systems Dessign and Implementation (OSDI'02)
, pp. 255-270
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
-
13
-
-
27144447960
-
How to spread adversarial nodes? Rotate!
-
New York, NY, USA, STOC'05, ACM
-
Christian Scheideler, "How to spread adversarial nodes? rotate!", in Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, New York, NY, USA, 2005, STOC'05, pp. 704-713, ACM.
-
(2005)
Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing
, pp. 704-713
-
-
Scheideler, C.1
-
14
-
-
33749571809
-
Towards a scalable and robust dht
-
New York, NY, USA, SPAA'06, ACM
-
Baruch Awerbuch and Christian Scheideler, "Towards a scalable and robust dht", in Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures, New York, NY, USA, 2006, SPAA'06, pp. 318-327, ACM.
-
(2006)
Proceedings of the Eighteenth Annual ACM Symposium on Parallelism in Algorithms and Architectures
, pp. 318-327
-
-
Awerbuch, B.1
Scheideler, C.2
-
17
-
-
70449635733
-
A dos-resilient information system for dynamic data management
-
New York, NY, USA, SPAA '09, ACM
-
Matthias Baumgart, Christian Scheideler, and Stefan Schmid, "A dos-resilient information system for dynamic data management", in Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures, New York, NY, USA, 2009, SPAA '09, pp. 300-309, ACM.
-
(2009)
Proceedings of the Twenty-first Annual Symposium on Parallelism in Algorithms and Architectures
, pp. 300-309
-
-
Baumgart, M.1
Scheideler, C.2
Schmid, S.3
-
18
-
-
70449092008
-
A distributed and oblivious heap
-
Berlin, Heidelberg, ICALP'09, Springer-Verlag
-
Christian Scheideler and Stefan Schmid, "A distributed and oblivious heap", in Proceedings of the 36th Internatilonal Colloquium on Automata, Languages and Programming: Part II, Berlin, Heidelberg, 2009, ICALP'09, pp. 571-582, Springer-Verlag.
-
(2009)
Proceedings of the 36th Internatilonal Colloquium on Automata, Languages and Programming: Part II
, pp. 571-582
-
-
Scheideler, C.1
Schmid, S.2
-
19
-
-
77954867373
-
Towards worst-case churn resistant peer-to-peer systems
-
May
-
Fabian Kuhn, Stefan Schmid, and Roger Wattenhofer, "Towards worst-case churn resistant peer-to-peer systems", Distributed Computing Journal (DC), vol. 22, no. 4, pp. 249-267, May 2010.
-
(2010)
Distributed Computing Journal (DC)
, vol.22
, Issue.4
, pp. 249-267
-
-
Kuhn, F.1
Schmid, S.2
Wattenhofer, R.3
-
21
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
D. Chaum, C. Crépeau, and I. Damgard, "Multiparty Unconditionally Secure Protocols", 20th annual ACM symposium on Theory of computing (STOC'88), pp. 11-19, 1988.
-
(1988)
20th Annual ACM Symposium on Theory of Computing (STOC'88)
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgard, I.3
-
22
-
-
85032862464
-
Multiparty protocols tolerating half faulty processors
-
Lecture Notes in Computer Science
-
D. Beaver, "Multiparty protocols tolerating half faulty processors", in Advances in Cryptology (CRYPTO'89), 1990, vol. 435 of Lecture Notes in Computer Science, pp. 560-572.
-
(1990)
Advances in Cryptology (CRYPTO'89)
, vol.435
, pp. 560-572
-
-
Beaver, D.1
-
24
-
-
84957717648
-
Efficient multiparty computations secure against an adaptive adversary
-
R. Cramer, I. Damg ard, S. Dziembowski, M. Hirt, and T. Rabin, "Efficient multiparty computations secure against an adaptive adversary", in Advances in Cryptology (Eurocrypt'99), 1999, pp. 311-326.
-
(1999)
Advances in Cryptology (Eurocrypt'99)
, pp. 311-326
-
-
Cramer, R.1
Damg Ard, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
25
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
R. Cleve, "Limits on the security of coin flips when half the processors are faulty", in 18th annual ACM symposium on Theory of computing (STOC'86), 1986, pp. 364-369.
-
(1986)
18th Annual ACM Symposium on Theory of Computing (STOC'86)
, pp. 364-369
-
-
Cleve, R.1
-
26
-
-
0002738457
-
A zero-one law for boolean privacy
-
B. Chor and E. Kushilevitz, "A Zero-One Law for Boolean Privacy", SIAM Journal on Discrete Mathematics, vol. 4, no. 1, pp. 36-47, 1991.
-
(1991)
SIAM Journal on Discrete Mathematics
, vol.4
, Issue.1
, pp. 36-47
-
-
Chor, B.1
Kushilevitz, E.2
-
29
-
-
79952946379
-
On achieving the best of both worlds in secure multiparty computation
-
Y. Ishai, J. Katz, E. Kushilevitz, Y. Lindell, and E. Petrank, "On achieving the best of both worlds in secure multiparty computation", SIAM journal on computing, vol. 40, no. 1, pp. 122-141, 2011.
-
(2011)
SIAM Journal on Computing
, vol.40
, Issue.1
, pp. 122-141
-
-
Ishai, Y.1
Katz, J.2
Kushilevitz, E.3
Lindell, Y.4
Petrank, E.5
-
30
-
-
78249233265
-
Computing in social networks
-
A. Giurgiu, R. Guerraoui, K. Huguenin, and A-M. Kermarrec, "Computing in Social Networks", Lecture Notes in Computer Science, vol. 6366, pp. 332-346, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6366
, pp. 332-346
-
-
Giurgiu, A.1
Guerraoui, R.2
Huguenin, K.3
Kermarrec, A.-M.4
-
32
-
-
57949113684
-
Fast asynchronous byzantine agreement and leader election with full information
-
B. Kapron, D. Kempe, V. King, J. Saia, and V. Sanwalani, "Fast asynchronous byzantine agreement and leader election with full information", in Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms (SODA'08), 2008, pp. 1038-1047.
-
(2008)
Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'08)
, pp. 1038-1047
-
-
Kapron, B.1
Kempe, D.2
King, V.3
Saia, J.4
Sanwalani, V.5
-
33
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key Cryptosystems based on Composite Degree Residuosity Classes", Advances in Cryptology (EUROCRYPT'99), 1999.
-
(1999)
Advances in Cryptology (EUROCRYPT'99)
-
-
Paillier, P.1
-
35
-
-
84874340305
-
-
Arxiv preprint 1107.5419
-
S. Gambs, R. Guerraoui, H. Harkous, F. Huc, and A. Kermarrec, "Scalable and Secure Aggregation in Distributed Networks", Arxiv preprint 1107.5419, 2011.
-
(2011)
Scalable and Secure Aggregation in Distributed Networks
-
-
Gambs, S.1
Guerraoui, R.2
Harkous, H.3
Huc, F.4
Kermarrec, A.5
-
36
-
-
77955963220
-
Practical robust communication in dhts tolerating a byzantine adversary
-
M. Young, A. Kate, I. Goldberg, and M. Karsten, "Practical Robust Communication in DHTs Tolerating a Byzantine Adversary", in International Conference on Distributed Computing Systems (ICDCS'10), 2010, pp. 263-272.
-
(2010)
International Conference on Distributed Computing Systems (ICDCS'10)
, pp. 263-272
-
-
Young, M.1
Kate, A.2
Goldberg, I.3
Karsten, M.4
-
37
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
Washington, DC, USA, SFCS '85, IEEE Computer Society
-
Benny Chor, Shafi Goldwasser, Silvio Micali, and Baruch Awerbuch, "Verifiable secret sharing and achieving simultaneity in the presence of faults", in Proceedings of the 26th Annual Symposium on Foundations of Computer Science, Washington, DC, USA, 1985, SFCS '85, pp. 383-395, IEEE Computer Society.
-
(1985)
Proceedings of the 26th Annual Symposium on Foundations of Computer Science
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
38
-
-
82955184587
-
Computational verifiable secret sharing revisited
-
Dong Hoon Lee and Xiaoyun Wang, Eds. of Lecture Notes in Computer Science, Springer
-
Arpita Patra Michael Backes, Aniket Kate, "Computational verifiable secret sharing revisited", in ASIACRYPT, Dong Hoon Lee and Xiaoyun Wang, Eds. 2011, vol. 7073 of Lecture Notes in Computer Science, pp. 590-609, Springer.
-
(2011)
ASIACRYPT
, vol.7073
, pp. 590-609
-
-
Patra, A.1
Backes, M.2
Kate, A.3
-
39
-
-
85036605801
-
Distributed paillier cryptosystem without trusted dealer
-
T. Nishide and K. Sakurai, "Distributed Paillier Cryptosystem without Trusted Dealer", Information Security Applications, pp. 44-60, 2011.
-
(2011)
Information Security Applications
, pp. 44-60
-
-
Nishide, T.1
Sakurai, K.2
-
40
-
-
76249110820
-
Efficient non-interactive range proof
-
T. Yuen, Q. Huang, Y. Mu, W. Susilo, D. Wong, and G. Yang, "Efficient non-interactive range proof", in 15th Annual International Conference on Computing and Combinatorics (COCOON'09), 2009, pp. 138-147.
-
(2009)
15th Annual International Conference on Computing and Combinatorics (COCOON'09)
, pp. 138-147
-
-
Yuen, T.1
Huang, Q.2
Mu, Y.3
Susilo, W.4
Wong, D.5
Yang, G.6
-
41
-
-
78751674305
-
Load balanced scalable byzantine agreement through quorum building, with full information
-
V. King, S. Lonargan, J. Saia, and A. Trehan, "Load balanced scalable byzantine agreement through quorum building, with full information", Distributed Computing and Networking, pp. 203-214, 2011.
-
(2011)
Distributed Computing and Networking
, pp. 203-214
-
-
King, V.1
Lonargan, S.2
Saia, J.3
Trehan, A.4
|