1987
DOI: 10.1137/0216031
|View full text |Cite
|
Sign up to set email alerts
|

Fast Distributed Agreement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
51
0

Year Published

1991
1991
2008
2008

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(52 citation statements)
references
References 7 publications
1
51
0
Order By: Relevance
“…This tight bound more generally holds with respect to unconditional security, i.e., when even allowing a negligible error probability, as proven by Karlin and Yao [15]. For the same model numerous unconditionally secure protocols with optimal resilience have been proposed in the literature [9,1,19,10,3,5,13] which all have communication and computation complexities polynomial in the number of players. The extension of the standard communication model by partial broadcast was already considered by Franklin, Wright, and Yung in [11,12] in the context of secure point-to-point communication over an incomplete network -a problem initially studied by Dolev, Dwork, Waarts, and Yung [8] for the standard communication model.…”
Section: Previous Workmentioning
confidence: 85%
“…This tight bound more generally holds with respect to unconditional security, i.e., when even allowing a negligible error probability, as proven by Karlin and Yao [15]. For the same model numerous unconditionally secure protocols with optimal resilience have been proposed in the literature [9,1,19,10,3,5,13] which all have communication and computation complexities polynomial in the number of players. The extension of the standard communication model by partial broadcast was already considered by Franklin, Wright, and Yung in [11,12] in the context of secure point-to-point communication over an incomplete network -a problem initially studied by Dolev, Dwork, Waarts, and Yung [8] for the standard communication model.…”
Section: Previous Workmentioning
confidence: 85%
“…That is, ByzCon's connectivity requirements, fault tolerance ratio and running time, are the same as in the Byzantine agreement algorithm of [14]; i.e., ByzCon requires a fully connected graph among the nodes participating in ByzCon and it supports up to a third of them being Byzantine.…”
Section: Fully Connected Byzantine Consensusmentioning
confidence: 97%
“…Take any Byzantine agreement 2 algorithm (for example, see [14]), and denote it by BA. ByzCon executes n instance of BA, one for each node p's input value, thus agreeing on the input value v p .…”
Section: Fully Connected Byzantine Consensusmentioning
confidence: 99%
“…A protocol with this round complexity -but with exponential message complexity -was shown in the initial work by Pease et al [24,29]. Following a long sequence of works [9,1,33,12,26,5,4], Garay and Moses [19] showed a deterministic, polynomial-time Byzantine agreement protocol having optimal resilience t < n/3 and optimal round complexity t + 1.…”
Section: Introductionmentioning
confidence: 99%