Authenticated Algorithms for Byzantine Agreement
From MaRDI portal
Publication:3036697
Recommendations
Cited in
(only showing first 100 items - show all)- Efficient algorithms for anonymous Byzantine agreement
- Always have a backup plan: fully secure synchronous MPC with asynchronous fallback
- How Byzantine is a send corruption?
- Shifting gears: Changing algorithms on the fly to expedite Byzantine agreement
- A new solution for the Byzantine generals problem
- Practical quantum Byzantine protocol via nearly optimal entanglement resources
- How to cope with faulty processors in a completely connected network of communicating processors
- Message-optimal protocols for Byzantine Agreement
- Efficient agreement using fault diagnosis.
- On expected constant-round protocols for Byzantine agreement
- Diffusion without false rumors: On propagating updates in a Byzantine environment.
- Fairness versus guaranteed output delivery in secure multiparty computation
- Constant-round asynchronous multi-party computation based on one-way functions
- On the round complexity of Byzantine agreement without initial set-up
- The Heard-Of model: computing in distributed systems with benign faults
- Round-preserving parallel composition of probabilistic-termination cryptographic protocols
- Information-theoretic broadcast with dishonest majority for long messages
- Reaching approximate agreement in the presence of faults
- On the composition of authenticated Byzantine Agreement
- scientific article; zbMATH DE number 4085017 (Why is no real title available?)
- Probabilistic Termination and Composability of Cryptographic Protocols
- Round-optimal Byzantine agreement
- Sublinear-round Byzantine agreement under corrupt majority
- Simultaneity is harder than agreement
- Structured Derivation of Semi-Synchronous Algorithms
- Reverse firewalls for actively secure MPCs
- Deontic logic, contrary to duty reasoning and fault tolerance
- On the computational overhead of MPC with dishonest majority
- Efficient fully secure computation via distributed zero-knowledge proofs
- Cryptography and cryptographic protocols
- The topology of distributed adversaries
- Bounds on information exchange for Byzantine agreement
- Order-fairness for Byzantine consensus
- Hundreds of impossibility results for distributed computing
- Algorand: a secure and efficient distributed ledger
- Efficient fault-tolerant fixed routings on \((k+1)\)-connected digraphs
- Unconditional Byzantine agreement for any number of faulty processors (extended abstract)
- The firing squad problem revisited
- Reliable broadcasts and communication models: tradeoffs and lower bounds
- The firing squad problem revisited
- Fast Distributed Agreement
- Probabilistic termination and composability of cryptographic protocols
- On the number of authenticated rounds in Byzantine Agreement
- Synchronous consensus under hybrid process and link failures
- Efficient constant-round MPC with identifiable abort and public verifiability
- On the possibility and impossibility of achieving clock synchronization
- Synchronous consensus with optimal asynchronous fallback guarantees
- Security against covert adversaries: Efficient protocols for realistic adversaries
- PoW-based distributed cryptography with no trusted setup
- MPC with synchronous security and asynchronous responsiveness
- A simple Byzantine generals protocol
- A self-adjusting algorithm for Byzantine agreement
- Gossiping for communication-efficient broadcast
- Distributed agreement in the presence of processor and communication faults
- On the message complexity of binary Byzantine agreement under crash failures
- Practical provably secure flooding for blockchains
- On Verifying Fault Tolerance of Distributed Protocols
- scientific article; zbMATH DE number 7774289 (Why is no real title available?)
- Efficient secure multiparty computation with identifiable abort
- Knowledge and common knowledge in a Byzantine environment: Crash failures
- Time is not a healer (preliminary version)
- Stopping times of distributed consensus protocols: a probabilistic analysis
- A new look at fault-tolerant network routing
- Agreement under faulty interfaces
- Authenticated broadcast with a partially compromised public-key infrastructure
- Fast agreement in networks with Byzantine nodes
- Characterization of secure multiparty computation without broadcast
- Characterization of secure multiparty computation without broadcast
- Broadcast (and round) efficient verifiable secret sharing
- Zombies and ghosts: optimal Byzantine agreement in the presence of omission faults
- Synchronous \(t\)-resilient consensus in arbitrary graphs
- On the round complexity of randomized Byzantine agreement
- Completeness theorems for adaptively secure broadcast
- Network-agnostic security comes (almost) for free in DKG and MPC
- Adaptively secure BLS threshold signatures from DDH and co-CDH
- Fully secure MPC and zk-FLIOP over rings: new constructions, improvements and extensions
- Broadcast-optimal two-round MPC
- Resource-restricted cryptography: revisiting MPC bounds in the proof-of-work era
- Improved extension protocols for Byzantine broadcast and agreement
- Communication complexity of Byzantine agreement, revisited
- Byzantine consensus is \(\Theta(n^2)\): the Dolev-Reischuk bound is tight even in partial synchrony!
- Good-case early-stopping latency of synchronous Byzantine reliable broadcast: the deterministic case
- Broadcast-optimal two round MPC with an honest majority
- Broadcast-optimal four-round MPC in the plain model
- Network agnostic MPC with statistical security
- Memory checking for parallel RAMs
- On the round complexity of fully secure solitary MPC with honest majority
- Synchronizable fair exchange
- Deterministic Fault-Tolerant Distributed Computing in Linear Time and Communication
- On the Amortized Communication Complexity of Byzantine Broadcast
- Synchronization Modulo k in Dynamic Networks
- MPClan: protocol suite for privacy-conscious computations
- Sublinear message bounds of authenticated implicit Byzantine agreement
- Detecting causality in the presence of Byzantine processes: the case of synchronous systems
- Uniform atomic broadcast and consensus in fully anonymous synchronous systems with crash failures
- Proof-of-reputation blockchain with Nakamoto fallback
- Synchronous \(t\)-resilient consensus in arbitrary graphs
- Levels of authentication in distributed agreement
- scientific article; zbMATH DE number 1154413 (Why is no real title available?)
- Synchronization modulo \(P\) in dynamic networks
This page was built for publication: Authenticated Algorithms for Byzantine Agreement
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3036697)