skip to main content
10.1145/323596.323610acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article
Free Access

Simple constant-time consensus protocols in realistic failure models (extended abstract)

Published:01 August 1985Publication History
First page image

References

  1. ABCGM.B. Awerbuctl, M. Blum, B. Chor, S. Goldwasscr, and S. Micali, "How to hnplement Bracha's O(logn) Byzantine Agreement Algorithm", unpublished manuscript, MIT.Google ScholarGoogle Scholar
  2. ACGS.W. Alcxi, B. Chor, O. Goldreich, and C.P. Schnorr, "RSA/Rabin Bits Are ~ + poly(log N) 1 Secure", Proc. 25tn Annual Symposture on Foundations of Computer Science (1984), pp. 449-457.Google ScholarGoogle Scholar
  3. Be.M. Ben-Or, "Another Advantage of Free Choice: Completely Asynchronous Agreement Protocols", Proc. 2nu Annual A CM Symposium on Principles of Distributed Computing (1983), pp. 27-30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Br.G. Bracha, "An O(lg n) Expected Rounds Randomized Byzantine Generals Algorithm", Proc. 17tn Annual A CM Symposium on Theory of Computing (1985), pp. 316-326. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. BT.G. Bracha and S. Toueg, "Resilient Consensus Protocols", Proc. 2~u Annual A CM Symposium on Principles of Distributed Computing (1983). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. CC.B. Chor and B. Coan, "A Simple and Efficient Randomized Byzantine Agreement Algn Orithm", Proc. 4ta Symposium on Reliability Distributed Software and Database Systems (1984), pp. 98-106. To appear in IEEE Transactions on Software Engineering.Google ScholarGoogle Scholar
  7. DS.D. Dolev and H. R. Strong, "Polynomial Algorithms for Multiple Processor Agreement", Proc. 14tn Annual A CM Symposium on Theory of Computing (1982), pp. 401-407. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. FLP.M.J. Fischer, N.A. Lynch, and M.S. Paterson, "Impossibility of Distributed Consensus with One Faulty Process", Proc. 2na ACM Symposium on Database Systems (1983), pp. 1- 7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. GM.S. Goldwasser and S. Micali, "Probabilistic Encryption", Jour. of Computer and System Sciences, 28(2) (1984), pp. 270-299.Google ScholarGoogle ScholarCross RefCross Ref
  10. GMR.S. Goldwasscr, S. Micali, and C. Rackoff, "The Knowledge Complexity of Interactive Proof", Proc. 17*h Annual ACM Symposium on Theory of Computing (/985), pp. 291-304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. KY.A.R. Karlin and A.C. Yao, "Probabilistic Lower Bounds for Byzantine Agreement and Clock Synchronizatir;n", unpublished manuscript, Stanford University.Google ScholarGoogle Scholar
  12. LSP.L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem", A CM Transactions on Programming Languages and Systems 4(3) (1982), pp. 382-401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. PSL.M. Pease, R. Shostak, and L. Lamport, "Reaching Agreement in the Presence of Faults" JACM 27(2) (1980)pp. 228-234. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Pi.S. Pinter, Distributed Computation Systems, Ph.D. thesis, Boston University, (1983).Google ScholarGoogle Scholar
  15. Ra.M.O. Rabin, "Randomized Byzantine Generals", Proc. 24tn Annual Symposium on Foundations of Computer Science (1983), pp. 403-4O9.Google ScholarGoogle Scholar
  16. Ro.E.C. Rosen, ~'Vulnerability of Network Control Protocols: An Example" A CM SIG- SOFT Software Engineering Notes, 6(1) (1981), pp. 6-8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. TC.R. Turpin and B. Coan, "Extending Binary Byzantine Agreement to Multivalucd Byzantine Agreement", Information Processing Letters 18(2)(1984), pp. 73-76.Google ScholarGoogle ScholarCross RefCross Ref
  18. Y1.A.C. Yao, "Theory and Applications of Trapdoor Functions", Proc. of the 23rd IEEE Symposium on Foundations of Computer Science, (1982), pp. 80-91.Google ScholarGoogle Scholar
  19. Y2.A.C. Yao, private communication.Google ScholarGoogle Scholar

Index Terms

  1. Simple constant-time consensus protocols in realistic failure models (extended abstract)

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  PODC '85: Proceedings of the fourth annual ACM symposium on Principles of distributed computing
                  August 1985
                  316 pages
                  ISBN:0897911687
                  DOI:10.1145/323596

                  Copyright © 1985 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 August 1985

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  Overall Acceptance Rate740of2,477submissions,30%

                  Upcoming Conference

                  PODC '24

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader