Capacity of Byzantine Agreement ( Preliminary Draft – Work in Progress )

Caveat: This report represents work-in-progress, and provides some of our early results on the topic. A more complete version of this report, with additional results not presented in this draft, and improved description of the algorithms and analysis, will be released later this year. This draft version contains known problems with clarity/readability and the descriptions are incomplete/imprecise in some places. The draft is being released nevertheless to seek early feedback from other researchers.

[1]  Nitin H. Vaidya,et al.  When Watchdog Meets Coding , 2009, 2010 Proceedings IEEE INFOCOM.

[2]  Lang Tong,et al.  Nonlinear network coding is necessary to combat general Byzantine attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[3]  Tracey Ho,et al.  Network Error Correction With Unequal Link Capacities , 2010, IEEE Transactions on Information Theory.

[4]  Tal Mizrahi,et al.  Continuous Consensus with Failures and Recoveries , 2008, DISC.

[5]  Yong Guan,et al.  An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[6]  Ramakrishna Kotla,et al.  Zyzzyva , 2007, SOSP.

[7]  Shlomi Dolev,et al.  Stability of Multivalued Continuous Consensus , 2007, SIAM J. Comput..

[8]  Robert Griesemer,et al.  Paxos made live: an engineering perspective , 2007, PODC '07.

[9]  Fang Zhao,et al.  Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.

[10]  Tracey Ho,et al.  Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[11]  Christina Fragouli,et al.  On Feedback for Network Coding , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[12]  John C. S. Lui,et al.  On the Practical and Security Issues of Batch Content Distribution Via Network Coding , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[13]  Christos Gkantsidis,et al.  Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[14]  Kamal Jain,et al.  Signatures for Network Coding , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[15]  Tal Mizrahi,et al.  Continuous consensus via common knowledge , 2005, Distributed Computing.

[16]  Tracey Ho,et al.  Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[17]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[18]  Ning Cai,et al.  Network error correction , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..

[19]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[20]  Roy Friedman,et al.  Distributed Agreement and Its Relation with Error-Correcting Codes , 2002, DISC.

[21]  R. Koetter,et al.  An algebraic approach to network coding , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).

[22]  Leslie Lamport,et al.  The part-time parliament , 1998, TOCS.

[23]  P. Reynier,et al.  Active replication in Delta-4 , 1992, [1992] Digest of Papers. FTCS-22: The Twenty-Second International Symposium on Fault-Tolerant Computing.

[24]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[25]  C. R. Kime,et al.  System diagnosis , 1986 .

[26]  Eric C. Cooper Replicated distributed programs , 1985, SOSP '85.

[27]  J. T. Sims,et al.  The Byzantine Generals Problem , 1982, TOPL.

[28]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[29]  GERNOT METZE,et al.  On the Connection Assignment Problem of Diagnosable Systems , 1967, IEEE Trans. Electron. Comput..

[30]  T. Ho,et al.  On Linear Network Coding , 2010 .

[31]  Nitin H. Vaidya,et al.  Secure Capacity of Wireless Broadcast Networks , 2009 .

[32]  R. Yeung,et al.  NETWORK ERROR CORRECTION , PART I : BASIC CONCEPTS AND UPPER BOUNDS , 2006 .

[33]  R. Yeung,et al.  NETWORK ERROR CORRECTION, PART II: LOWER BOUNDS , 2006 .

[34]  G. Even,et al.  (Extended Abstract) ABSTRACT , 2022 .

[35]  M. Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[36]  Seif Haridi,et al.  Distributed Algorithms , 1992, Lecture Notes in Computer Science.