Authenticated Byzantine generals in dual failure model
DOI10.1007/978-3-642-11322-2_12zbMATH Open1350.68035OpenAlexW157980196MaRDI QIDQ3406476FDOQ3406476
Authors: Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan
Publication date: 16 February 2010
Published in: Distributed Computing and Networking (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-11322-2_12
Recommendations
Reliability, testing and fault tolerance of networks and computer systems (68M15) Distributed systems (68M14) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- Identity-based cryptosystems and signature schemes
- Title not available (Why is that?)
- Trapdoors for hard lattices and new cryptographic constructions
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Authenticated Algorithms for Byzantine Agreement
- Impossibility of distributed consensus with one faulty process
- On the minimal synchronism needed for distributed consensus
- Reaching Agreement in the Presence of Faults
- The Byzantine Generals Problem
- The Byzantine generals strike again
- On Robust Combiners for Oblivious Transfer and Other Primitives
- Title not available (Why is that?)
- From partial consistency to global broadcast
- New lattice-based cryptographic constructions
- On expected constant-round protocols for Byzantine agreement
- On the composition of authenticated byzantine agreement
- Robuster Combiners for Oblivious Transfer
- On Robust Combiners for Private Information Retrieval and Other Primitives
- On the number of authenticated rounds in Byzantine Agreement
Cited In (5)
- Player-centric Byzantine agreement
- Zombies and ghosts: optimal Byzantine agreement in the presence of omission faults
- Byzantine Agreement Using Partial Authentication
- Byzantine fault tolerant public key authentication in peer-to-peer systems
- Authenticated broadcast with a partially compromised public-key infrastructure
This page was built for publication: Authenticated Byzantine generals in dual failure model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3406476)