The Byzantine generals strike again

From MaRDI portal
Revision as of 23:49, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3959472

DOI10.1016/0196-6774(82)90004-9zbMath0495.68093DBLPjournals/jal/Dolev82OpenAlexW2014772227WikidataQ60304998 ScholiaQ60304998MaRDI QIDQ3959472

Danny Dolev

Publication date: 1982

Published in: Journal of Algorithms (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/0196-6774(82)90004-9




Related Items (70)

On the possibility and impossibility of achieving clock synchronizationEasy impossibility proofs for distributed consensus problemsSerializability theory for replicated databasesInvited talk: Resilient distributed algorithmsAgreement under faulty interfacesBroadcasting with locally bounded byzantine faultsOblivious transfer in incomplete networksThe Heard-Of model: computing in distributed systems with benign faultsAgreement in the presence of faults, on networks of bounded degreeInstant block confirmation in the sleepy modelRigorously modeling self-stabilizing fault-tolerant circuits: an ultra-robust clocking scheme for systems-on-chipCommunications in unknown networks: preserving the secret of topologyAgreement in synchronous networks with ubiquitous faultsPerformance study of Byzantine agreement protocol with artificial neural networkThe Byzantine Generals Problem in Generic and Wireless NetworksFeasibility and complexity of broadcasting with random transmission failuresReliable broadcast with respect to topology knowledgeIs information-theoretic topology-hiding computation possible?Mutual information reconciliation in non-fully connected heterogeneous multicomputer computational systemsTime is not a healerBroadcast (and Round) Efficient Verifiable Secret SharingSynchronous \(t\)-resilient consensus in arbitrary graphsAsynchronous Byzantine reliable broadcast with a message adversaryCorrection to: ``Topology-hiding communication from minimal assumptionsThe Failure Discovery problemModular construction of an efficient 1-bit Byzantine agreement protocolBreaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per partyGraph-theoretic approaches for analyzing the resilience of distributed control systems: a tutorial and surveyAlgorand: a secure and efficient distributed ledgerDistributed computations in fully-defective networksSynchronous counting and computational algorithm designAn algorithm for identification of maliciously faulty unitsTight bound on mobile Byzantine agreementProbabilistic reliability and privacy of communication using multicast in general neighbor networksEfficient Counting with Optimal ResilienceAlmost-everywhere secure computation with edge corruptionsConsensus in the presence of mortal Byzantine faulty processesSubmodularity-based false data injection attack scheme in multi-agent dynamical systemsDistributed CONGEST Algorithms against Mobile AdversariesMulti-verifier signaturesSecure message transmission in asynchronous networksOn private computation in incomplete networksComputational aspects of uncertainty profiles and angel-daemon gamesA lower bound for the time to assure interactive consistencyConstant-Space Localized Byzantine ConsensusOptimal asynchronous agreement and leader election algorithm for complete networks with Byzantine faulty linksHundreds of impossibility results for distributed computingOn the impact of link faults on Byzantine agreementMust the communication graph of MPC protocols be an expander?Modular construction of a Byzantine agreement protocol with optimal message bit complexityA self-adjusting algorithm for Byzantine agreementIncentives and the structure of communication\(f\)-sensitivity distance oracles and routing schemesCryptanalysis of Secure Message Transmission Protocols with FeedbackSynchronous consensus under hybrid process and link failuresUnnamed ItemLower bounds for weak Byzantine agreementResilient consensus for multi-agent systems subject to differential privacy requirementsEfficient reliable communication over partially authenticated networksNear-optimal self-stabilising counting and firing squadsByzantine Agreement Using Partial AuthenticationRecent Results on Fault-Tolerant Consensus in Message-Passing NetworksAuthenticated Byzantine Generals in Dual Failure ModelReliable communication over partially authenticated networksOn the round complexity of Byzantine agreement without initial set-upFault-tolerant algorithms for tick-generation in asynchronous logicUnnamed ItemHow to cope with faulty processors in a completely connected network of communicating processorsEfficient agreement using fault diagnosis.Fast consensus in networks of bounded degree.






This page was built for publication: The Byzantine generals strike again