International Conference on Dependable Systems and Networks, 2004 2004
DOI: 10.1109/dsn.2004.1311884
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Byzantine-tolerant erasure-coded storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
147
0
5

Year Published

2008
2008
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 129 publications
(155 citation statements)
references
References 19 publications
1
147
0
5
Order By: Relevance
“…The main result of this paper, that robust access to amnesic storage is possible in optimal time is somewhat surprising given the large body of literature on nonamnesic [4,[10][11][12][13][14] and non-robust [5,8,9,18] algorithms. Moreover, our result is counter-intuitive because so far, only non-amnesic algorithms match the timecomplexity lower bounds.…”
Section: Protocol Correctnessmentioning
confidence: 99%
See 1 more Smart Citation
“…The main result of this paper, that robust access to amnesic storage is possible in optimal time is somewhat surprising given the large body of literature on nonamnesic [4,[10][11][12][13][14] and non-robust [5,8,9,18] algorithms. Moreover, our result is counter-intuitive because so far, only non-amnesic algorithms match the timecomplexity lower bounds.…”
Section: Protocol Correctnessmentioning
confidence: 99%
“…While some relax waitfreedom and provide weaker termination guarantees instead [2,8], others relax consistency and implement only the weaker safe semantics [2,5,9,10]. Generally, when it comes to robustly accessing (unauthenticated) data, most algorithms store an unlimited number of values in the base objects [10][11][12]. Also in systems where base objects push messages to subscribed clients [4,13,14], the servers store every update until the corresponding message has been received by every non-faulty subscriber.…”
Section: Previous and Related Workmentioning
confidence: 99%
“…Thus, in this case, the consistency constraint is equivalent to, However, this is (6), the constraint on probabilistic masking quorum systems without write markers. In effect, a faulty client must either: (i) use a recent access set that is therefore chosen approximately uniformly at random, and be limited by (7); or (ii), use a stale access set and be limited by (6). If quorums are the sizes of access sets, both inequalities have the same upper bound on b (see [15]); otherwise, a faulty client is disadvantaged by using a stale access set because a system that satisfies (6) can tolerate more faults than one that satisfies (7), and is therefore less likely to result in error (see [15]).…”
Section: Probabilistic Opaque Quorumsmentioning
confidence: 99%
“…We allow that faulty clients and servers may collude, and so we assume that faulty clients and servers all know the membership of B (although non-faulty clients and servers do not). However, for our implementation of write markers, as is typical for many Byzantine-fault-tolerant protocols (c.f., [4][5][6]9]), we assume that faulty clients and servers are computationally bound such that they cannot subvert standard cryptographic primitives such as digital signatures.…”
Section: Definitions and System Modelmentioning
confidence: 99%
See 1 more Smart Citation