Authenticated Algorithms for Byzantine Agreement

From MaRDI portal
Publication:3036697

DOI10.1137/0212045zbMath0524.68021DBLPjournals/siamcomp/DolevS83OpenAlexW2034791526WikidataQ64357328 ScholiaQ64357328MaRDI QIDQ3036697

Danny Dolev, H. Raymond Strong

Publication date: 1983

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/38c830bf6192d9e83cf6793d01c54032b63bb8f8




Related Items (84)

On the round complexity of randomized Byzantine agreementOn the possibility and impossibility of achieving clock synchronizationDiffusion without false rumors: On propagating updates in a Byzantine environment.Broadcast-optimal two round MPC with an honest majorityAgreement under faulty interfacesInformation-theoretic broadcast with dishonest majority for long messagesStopping times of distributed consensus protocols: a probabilistic analysisBroadcast from Minicast Secure Against General AdversariesThe Heard-Of model: computing in distributed systems with benign faultsEfficient Secure Multiparty Computation with Identifiable AbortPoW-Based Distributed Cryptography with No Trusted SetupA new look at fault-tolerant network routingAuthenticated broadcast with a partially compromised public-key infrastructureProof-of-reputation blockchain with Nakamoto fallbackReliable broadcasts and communication models: tradeoffs and lower boundsThe topology of distributed adversariesOptimal extension protocols for Byzantine broadcast and agreementRound-optimal Byzantine agreementSynchronous consensus with optimal asynchronous fallback guaranteesThe Firing Squad Problem Revisited.Time is not a healerUnconditional Byzantine agreement for any number of faulty processorsBroadcast (and Round) Efficient Verifiable Secret SharingSynchronous \(t\)-resilient consensus in arbitrary graphsMessage-optimal protocols for Byzantine AgreementConstant-Round Asynchronous Multi-Party Computation Based on One-Way FunctionsOn the number of authenticated rounds in Byzantine AgreementAlgorand: a secure and efficient distributed ledgerGossiping for communication-efficient broadcastMPClan: protocol suite for privacy-conscious computationsAn algorithm for identification of maliciously faulty unitsAttaining GOD beyond honest majority with friends and foesPractical provably secure flooding for blockchainsUniform atomic broadcast and consensus in fully anonymous synchronous systems with crash failuresFairness versus guaranteed output delivery in secure multiparty computationCompleteness theorems for adaptively secure broadcastNetwork-agnostic security comes (almost) for free in DKG and MPCCommunication complexity of Byzantine agreement, revisitedOn the Amortized Communication Complexity of Byzantine BroadcastDeterministic Fault-Tolerant Distributed Computing in Linear Time and CommunicationMPC with synchronous security and asynchronous responsivenessEfficient fully secure computation via distributed zero-knowledge proofsRound-efficient Byzantine agreement and multi-party computation with asynchronous fallbackKnowledge and common knowledge in a Byzantine environment: Crash failuresByzantine Gathering in Networks with Authenticated WhiteboardsHundreds of impossibility results for distributed computingCryptography and cryptographic protocolsMust the communication graph of MPC protocols be an expander?Shifting gears: Changing algorithms on the fly to expedite Byzantine agreementOn the message complexity of binary Byzantine agreement under crash failuresOptimistically tuning synchronous Byzantine consensus: another win for null messagesEfficient fault-tolerant fixed routings on \((k+1)\)-connected digraphsCharacterization of secure multiparty computation without broadcastEfficient algorithms for anonymous Byzantine agreementDeontic Logic, Contrary to Duty Reasoning and Fault ToleranceOn the Computational Overhead of MPC with Dishonest MajoritySecurity against covert adversaries: Efficient protocols for realistic adversariesA simple Byzantine generals protocolSynchronous consensus under hybrid process and link failuresUnnamed ItemCharacterization of Secure Multiparty Computation Without BroadcastRound-preserving parallel composition of probabilistic-termination cryptographic protocolsOn expected constant-round protocols for Byzantine agreementOn Verifying Fault Tolerance of Distributed ProtocolsSublinear-round Byzantine agreement under corrupt majoritySimultaneity is harder than agreementStructured Derivation of Semi-Synchronous AlgorithmsByzantine Agreement Using Partial AuthenticationProbabilistic Termination and Composability of Cryptographic ProtocolsProbabilistic termination and composability of cryptographic protocolsAuthenticated Byzantine Generals in Dual Failure ModelThe firing squad problem revisitedComputing (and Life) Is All about TradeoffsEfficient constant-round MPC with identifiable abort and public verifiabilityAlways have a backup plan: fully secure synchronous MPC with asynchronous fallbackReverse firewalls for actively secure MPCsHow Byzantine is a send corruption?Order-fairness for Byzantine consensusThe fault-tolerant cluster-sending problemPractical quantum Byzantine protocol via nearly optimal entanglement resourcesQuantum Byzantine agreement for any number of dishonest partiesSynchronization modulo \(P\) in dynamic networksResource-restricted cryptography: revisiting MPC bounds in the proof-of-work eraBroadcast-optimal two-round MPC




This page was built for publication: Authenticated Algorithms for Byzantine Agreement