Complexity of Byzantine Agreement , Revisited
暂无分享,去创建一个
Kartik Nayak | Elaine Shi | Danny Dolev | Ittai Abraham | Rafael Pass | Ling Ren | T-H. Hubert Chan | E. Shi | Kartik Nayak | R. Pass | D. Dolev | Ling Ren | Ittai Abraham | T-H. Hubert Chan
[1] Silvio Micali,et al. Optimal algorithms for Byzantine agreement , 1988, STOC '88.
[2] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[3] Brent Waters,et al. A Generic Approach to Constructing and Proving Verifiable Random Functions , 2017, TCC.
[4] Rafail Ostrovsky,et al. The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults , 2015, ITCS.
[5] Leslie Lamport,et al. The Weak Byzantine Generals Problem , 1983, JACM.
[6] Nancy A. Lynch,et al. Consensus in the presence of partial synchrony , 1988, JACM.
[7] Matthias Fitzi,et al. Generalized communication and security models in Byzantine agreement , 2002 .
[8] Jonathan Katz,et al. On Expected Constant-Round Protocols for Byzantine Agreement , 2006, CRYPTO.
[9] Martin Hirt,et al. Adaptively Secure Broadcast , 2010, EUROCRYPT.
[10] Kartik Nayak,et al. Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected O(n2) Communication, and Optimal Resilience , 2019, IACR Cryptol. ePrint Arch..
[11] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[12] Silvio Micali,et al. ALGORAND: The Efficient and Democratic Ledger , 2016, ArXiv.
[13] Erik Vee,et al. Scalable leader election , 2006, SODA '06.
[14] Nancy A. Lynch,et al. Easy impossibility proofs for distributed consensus problems , 1985, PODC '85.
[15] Nir Bitansky,et al. Verifiable Random Functions from Non-interactive Witness-Indistinguishable Proofs , 2017, Journal of Cryptology.
[16] Michael O. Rabin,et al. Randomized byzantine generals , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[17] Michael Ben-Or,et al. Another advantage of free choice (Extended Abstract): Completely asynchronous agreement protocols , 1983, PODC '83.
[18] Hagit Attiya,et al. Distributed Computing: Fundamentals, Simulations and Advanced Topics , 1998 .
[19] Jared Saia,et al. Breaking the O(n2) bit barrier: Scalable byzantine agreement with an adaptive adversary , 2010, JACM.
[20] Jonathan Katz,et al. Adaptively secure broadcast, revisited , 2011, PODC '11.
[21] Aggelos Kiayias,et al. Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain , 2018, EUROCRYPT.
[22] Sandro Coretti,et al. Probabilistic Termination and Composability of Cryptographic Protocols , 2016, CRYPTO.
[23] Danny Dolev,et al. Authenticated Algorithms for Byzantine Agreement , 1983, SIAM J. Comput..