2014
DOI: 10.1007/978-3-319-14472-6_7
|View full text |Cite
|
Sign up to set email alerts
|

BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
3

Relationship

1
8

Authors

Journals

citations
Cited by 49 publications
(37 citation statements)
references
References 26 publications
0
36
0
1
Order By: Relevance
“…Full BFT protocols, such as Shuttle [22] or BChain [10] can be used to also implement full consensus with a chain based protocol. However, other than RelBC, these protocols rely on view change and an eventually correct leader to guarantee LC2, even with a single proposer.…”
Section: The Bft-publishermentioning
confidence: 99%
See 1 more Smart Citation
“…Full BFT protocols, such as Shuttle [22] or BChain [10] can be used to also implement full consensus with a chain based protocol. However, other than RelBC, these protocols rely on view change and an eventually correct leader to guarantee LC2, even with a single proposer.…”
Section: The Bft-publishermentioning
confidence: 99%
“…Note that when more then f nodes are suspected to be Byzantine, the publisher can choose to run several different chains simultaneously with the same publication. BChain [10] develops tactics for choosing 2f +1 correct nodes out of 3f + 1.…”
Section: The Bft-publishermentioning
confidence: 99%
“…Failure detection. Finally, FastBFT adapts a failure detection mechanism from [11] to tolerate non-primary faults. Notice that a faulty node may simply crash or send a wrong share.…”
Section: Fastbft Overviewmentioning
confidence: 99%
“…(2) The consensus layer (see Sec. IV) deals with ordering of transactions and we divide it according to a type of the protocol used to Byzantine Fault Tolerant (e.g., [34], [13], [29], [47], [92]), Proof-of-Resource (e.g., [95], [48], [99], [89], [108]), and Proof-of-Stake (e.g., [10], [75]) protocols. (3) The replicated state machine (RSM) layer (see Sec.…”
Section: Countermeasuresmentioning
confidence: 99%