2019
DOI: 10.1016/j.tcs.2018.08.001
|View full text |Cite
|
Sign up to set email alerts
|

Approximate Agreement under Mobile Byzantine Faults

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(28 citation statements)
references
References 10 publications
0
28
0
Order By: Relevance
“…This proposition can be seen as an extension of a result given in [4], which deals with the Byzantine-type mobile adversary model. The condition there is n ≥ 3 f + 1.…”
Section: Proof Of Proposition 31mentioning
confidence: 58%
See 2 more Smart Citations
“…This proposition can be seen as an extension of a result given in [4], which deals with the Byzantine-type mobile adversary model. The condition there is n ≥ 3 f + 1.…”
Section: Proof Of Proposition 31mentioning
confidence: 58%
“…This is intuitive since Byzantine adversaries are more powerful. The proof technique in [4] is to transform the problem so that a general result in [17] for static adversaries can be applied. For Proposition 3.1, we have proved using arguments similar to those in [9], [19], which are also for the static case.…”
Section: Proof Of Proposition 31mentioning
confidence: 99%
See 1 more Smart Citation
“…Table 2 Differences between Schemes 1 and 2. in Table 1. In computer science (Bonomi et al (2019); LeBlanc et al (2013); Lynch (1996)), a common limitation is that MSR-based algorithms have the maximum tolerable number of malicious nodes n ≥ 2f + 1 only for complete graphs. In comparison, it is clear that the proposed Schemes 1 and 2 can tolerate more adversaries.…”
Section: Discussionmentioning
confidence: 99%
“…For example, Gallet et al [11] examine a system that can allocate the same identifier to multiple nodes. In [5], [18], [8], the authors examine a synchronous system with mobile Byzantine faults -those which hop from one node to another across rounds. In [23], [24], the authors consider self-stabilizing agreement problems in the presence of Byzantine faults, i.e., the correct nodes have to recover from arbitrary initial state even when the other Byzantine nodes maliciously prevent the correct nodes from recovering.…”
Section: Related Workmentioning
confidence: 99%