Asynchronous Byzantine Agreement with optimal resilience
暂无分享,去创建一个
C. Pandu Rangan | Ashish Choudhury | Arpita Patra | C. P. Rangan | Ashish Choudhury | A. Patra | Pandu Rangan
[1] Danny Dolev,et al. An almost-surely terminating polynomial protocol for asynchronous byzantine agreement with optimal resilience , 2008, PODC '08.
[2] Jonathan Katz,et al. Improving the round complexity of VSS in point-to-point networks , 2008, Inf. Comput..
[3] Richard J. Lipton,et al. Proceedings of the tenth annual ACM symposium on Theory of computing , 1978 .
[4] Marcin Paprzycki,et al. Distributed Computing: Fundamentals, Simulations and Advanced Topics , 2001, Scalable Comput. Pract. Exp..
[5] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[6] Hagit Attiya,et al. Distributed Computing: Fundamentals, Simulations and Advanced Topics , 1998 .
[7] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[10] Jonathan Katz,et al. Improving the round complexity of VSS in point-to-point networks , 2009, Inf. Comput..
[11] Michael O. Rabin,et al. Randomized byzantine generals , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[12] C. Pandu Rangan,et al. Simple and efficient asynchronous byzantine agreement with optimal resilience , 2009, PODC '09.
[13] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.
[14] Gabriel Bracha,et al. An asynchronous [(n - 1)/3]-resilient consensus protocol , 1984, PODC '84.
[15] Seif Haridi,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[16] Ran Canetti,et al. Studies in secure multiparty computation and applications , 1995 .
[17] K. Srinathan,et al. Round-Optimal and Efficient Verifiable Secret Sharing , 2006, TCC.
[18] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1983, PODS '83.
[19] Yuval Ishai,et al. The round complexity of verifiable secret sharing and secure multicast , 2001, STOC '01.
[20] Ivan Damgård,et al. Efficient Multiparty Computations Secure Against an Adaptive Adversary , 1999, EUROCRYPT.
[21] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[22] Matthias Fitzi,et al. Generalized communication and security models in Byzantine agreement , 2002 .
[23] Ran Canetti,et al. Fast asynchronous Byzantine agreement with optimal resilience , 1993, STOC.
[24] Silvio Micali,et al. An Optimal Algorithm for Synchronous Byzantine Agreement , 1997 .
[25] Martin Hirt,et al. Efficient Multi-party Computation with Dispute Control , 2006, TCC.
[26] Jared Saia,et al. Faster Agreement via a Spectral Method for Detecting Malicious Behavior , 2014, SODA.
[27] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[28] C. Pandu Rangan,et al. The Round Complexity of Verifiable Secret Sharing Revisited , 2009, CRYPTO.
[29] Ashish Choudhury,et al. Brief announcement: efficient optimally resilient statistical AVSS and its applications , 2012, PODC '12.
[30] Michael Ben-Or,et al. Another advantage of free choice (Extended Abstract): Completely asynchronous agreement protocols , 1983, PODC '83.
[31] Silvio Micali,et al. Optimal algorithms for Byzantine agreement , 1988, STOC '88.
[32] Silvio Micali,et al. An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement , 1997, SIAM J. Comput..
[33] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[34] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[35] R. Cramer,et al. Multiparty Computation, an Introduction , 2005 .