Not a COINcidence: Sub-Quadratic Asynchronous Byzantine Agreement WHP
暂无分享,去创建一个
[1] Kartik Nayak,et al. Communication complexity of byzantine agreement, revisited , 2018, Distributed Computing.
[2] Yevgeniy Dodis,et al. A Verifiable Random Function with Short Proofs and Keys , 2005, Public Key Cryptography.
[3] Christian Scheideler,et al. A denial-of-service resistant DHT , 2007, PODC '07.
[4] Hagit Attiya,et al. Distributed Computing: Fundamentals, Simulations and Advanced Topics , 1998 .
[5] Ittai Abraham,et al. Asymptotically Optimal Validated Asynchronous Byzantine Agreement , 2019, PODC.
[6] Dominic Williams,et al. DFINITY Technology Overview Series, Consensus System , 2018, ArXiv.
[7] Ran Canetti,et al. Fast asynchronous Byzantine agreement with optimal resilience , 1993, STOC.
[8] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[9] Achour Mostéfaoui,et al. Signature-Free Asynchronous Binary Byzantine Consensus with t < n/3, O(n2) Messages, and O(1) Expected Time , 2015, J. ACM.
[10] Silvio Micali,et al. ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement , 2018, IACR Cryptol. ePrint Arch..
[11] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1985, JACM.
[12] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[13] Ronen Tamari,et al. Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation , 2018, IACR Cryptol. ePrint Arch..
[14] Silvio Micali. Very Simple and Efficient Byzantine Agreement , 2017, ITCS.
[15] Jared Saia,et al. Breaking the O(n2) bit barrier: scalable byzantine agreement with an adaptive adversary , 2010, PODC.
[16] Adi Shamir,et al. How to share a secret , 1979, CACM.
[17] Gabriel Bracha,et al. Asynchronous Byzantine Agreement Protocols , 1987, Inf. Comput..
[18] Sam Toueg,et al. Resilient consensus protocols , 1983, PODC '83.
[19] O. Naor,et al. Cogsworth: Byzantine View Synchronization. , 2019 .
[20] Silvio Micali,et al. Verifiable random functions , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[21] Victor Shoup,et al. Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography , 2000, Journal of Cryptology.
[22] Ittai Abraham,et al. Hot-Stuff the Linear, Optimal-Resilience, One-Message BFT Devil , 2018, ArXiv.
[23] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[24] Michael Ben-Or,et al. Another advantage of free choice (Extended Abstract): Completely asynchronous agreement protocols , 1983, PODC '83.
[25] Dariusz R. Kowalski,et al. Ordered and delayed adversaries and how to work against them on a shared channel , 2017, Distributed Computing.
[26] Matthew K. Franklin,et al. Unique Ring Signatures: A Practical Construction , 2013, Financial Cryptography.
[27] Anisur Rahaman Molla,et al. The Cost of Global Broadcast in Dynamic Radio Networks , 2016, OPODIS.
[28] Michael O. Rabin,et al. Randomized byzantine generals , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).