2010
DOI: 10.1007/978-3-642-11322-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated Byzantine Generals in Dual Failure Model

Abstract: Pease et al. introduced the problem of Byzantine Generals (BGP) to study the effects of Byzantine faults in distributed protocols for reliable broadcast. It is well known that BGP among n players tolerating up to t faults is (efficiently) possible if and only if n > 3t. To overcome this severe limitation, Pease et al. introduced a variant of BGP, Authenticated Byzantine General (ABG). Here players are supplemented with digital signatures (or similar tools) to thwart the challenge posed by Byzantine faults. Sub… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
14
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 26 publications
2
14
0
Order By: Relevance
“…By invoking Lemma 1, Lemma 6 and Lemma 7 and the result of Gupta et al [GGBS10], we establish the theorem. By invoking Lemma 1, Lemma 6 and Lemma 7 and the result of Gupta et al [GGBS10], we establish the theorem.…”
Section: Main Theoremmentioning
confidence: 77%
See 2 more Smart Citations
“…By invoking Lemma 1, Lemma 6 and Lemma 7 and the result of Gupta et al [GGBS10], we establish the theorem. By invoking Lemma 1, Lemma 6 and Lemma 7 and the result of Gupta et al [GGBS10], we establish the theorem.…”
Section: Main Theoremmentioning
confidence: 77%
“…To understand the utility, potential and limitations of using authentication in distributed protocols for agreement, Gupta et al [GGBS10] studied ABA in new light. They generalize the existing models and thus, attempt to give a unified theory of agreements over the authenticated and non-authenticated domains.…”
Section: Byzantine Agreement Using Partial Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…We point out that, in that model, adding passive corruption makes no difference for Consensus [5]. Feasibility of BA with active and passive corruption (and a trusted PKI) was previously studied in [21] for Consensus, and in [20] for Consensus and Broadcast. In both works, a threshold adversary is considered; the corresponding bound for Consensus is 2t a + min{t a , t p } < n. In such a threshold world, constructing BA protocols for the corresponding bound turns out to be less involved than in the general-adversary setting, as one can consider the cases t a ≤ t p and t a > t p separately, and construct one protocol for each.…”
Section: Introductionmentioning
confidence: 94%
“…The reason is that in such a model the signatures of passively corrupted players are not reliable, as the adversary knows the signing keys and can trivially fake them. In [21] it is shown that given a Public-Key Infrastructure (PKI), an adversary who can actively corrupt up to t a players and passively corrupt up to t p players can be tolerated for Consensus if and only if 2t a + min{t a , t p } < n.…”
Section: Introductionmentioning
confidence: 99%