skip to main content
10.1145/167088.167105acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Fast asynchronous Byzantine agreement with optimal resilience

Published:01 June 1993Publication History
First page image

References

  1. AM.H. Attiya and M. Mavronicolas, "Efficiency of Semi, Synchronous versus Asynchronous Networks," Mathematical Systems Theory, to appear. Preliminary version in proceedings of the 28th annual Allerton Conference on Communication, Control and Computing, October 1990, pp. 578-587.Google ScholarGoogle Scholar
  2. BCG.M. Ben-Or, R. Canetti and O. Goldreich, "Asynchronous Secure Computations", submitted to these proceedings. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. BE.M. Ben-Or and R. EI-Yaniv, "Interactive Consistency in Constant Time", submitted for publication, 1991Google ScholarGoogle Scholar
  4. BGW.M. Ben-Or, S. Goldwasser and A. Wigderson, " Completeness Theorems for Non-Cryptographic Fault- Tolerant Distributed Computation", 20th STOC, pp. 1-10, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Br.G. Bracha, "An Asynchronous {(n- 1)/3J-resilient Consensus Protocol", 3rd PODC, pp. 154-162, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. CR.R. Canetti, and T. Rabin, "Optimal Asynchronous Byzantine Agreement", Technical Report #92-15, CS Department, Hebrew University, 1992.Google ScholarGoogle Scholar
  7. CCD.D. Chaum, C. Crepeau and i. Damgard, "Multiparty Unconditionally Secure Protocols", 20th STOC, pp. 11-19, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. CGMA.B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults", 26th FOCS, pp. 383-395, 1985.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. CD.B. Chor and C. Dwork, "Randomization in Bysantine Agreement", Advances in Computing Research, Vol. 5, pp. 443-497, 1989.Google ScholarGoogle Scholar
  10. Fe.P. Feldman, "Asynchronous Byzantine Agreement in Constant Expected Time", unpublished manuscript, 1989.Google ScholarGoogle Scholar
  11. FM.P. Feldman, and S. Micah, "An Optimal Algorithm For Synchronous Byzantine Agreement", 20th STOC, pp. 148-161, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. F.M. Fischer, "The Concensus Problem in Unreliable Distributed System", Technical Report, Yale University, 1983.Google ScholarGoogle Scholar
  13. FLP.M. Fischer, N. Lynch and M. Paterson, "Impossibility of Distributed Consensus with One Faulty Process", JACM, Vol. 32, no. 2, pp. 374-382, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. KY.A. Karlin and A. Yao, "Probabilistic Lower Bounds for Byzantine Agreement", unpublished manuscript, 1986.Google ScholarGoogle Scholar
  15. PSL.M. Pease, R. Shostak and L. Lamport, "Reaching Agreement in the Presence of Faults", JACM, Vol. 27 No. 2, pp. 228-234, 1980. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R1.M. Rabin, "Randomized Byzantine Generals", 24th FOCS, pp. 403-409, 1983.Google ScholarGoogle Scholar
  17. R2.T. Rabin, "Robust Sharing Of Secrets When The Dealer Is Honest Or Faulty", Masters Thesis, Hebrew University, submitted for publication to the JA CM.Google ScholarGoogle Scholar
  18. RB.T. Rabin and M. Ben-Or, "Verifiable Secret Sharing and Multiparty Protocols with Honest Majority", 21st STOC, pp. 73-85, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Sh.A. Shamir, "How to share a secret", CA CM, Vol. 22, No. 11, pp. 612-613, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Fast asynchronous Byzantine agreement with optimal resilience

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        STOC '93: Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing
        June 1993
        812 pages
        ISBN:0897915917
        DOI:10.1145/167088

        Copyright © 1993 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 June 1993

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate1,469of4,586submissions,32%

        Upcoming Conference

        STOC '24
        56th Annual ACM Symposium on Theory of Computing (STOC 2024)
        June 24 - 28, 2024
        Vancouver , BC , Canada

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader