2013
DOI: 10.1007/978-3-319-03850-6_17
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Byzantine Agreement on Arbitrary Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
83
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 18 publications
(83 citation statements)
references
References 12 publications
0
83
0
Order By: Relevance
“…As in the case of round-based MBF models [3,5,11,16,23], we assume that any process has access to a tamper-proof memory storing the correct protocol code.…”
Section: System Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…As in the case of round-based MBF models [3,5,11,16,23], we assume that any process has access to a tamper-proof memory storing the correct protocol code.…”
Section: System Modelmentioning
confidence: 99%
“…Failures are represented by Byzantine agents that are managed by an omniscient adversary that "moves" them from a host process to another and when an agent is in some process it is able to corrupt it in an unforeseen manner. Models investigated so far in the context of mobile Byzantine failures consider mostly round-based computations, and can be classified according to Byzantine mobility constraints: (i) constrained mobility [11] agents may only move from one host to another when protocol messages are sent (similarly to how viruses would propagate), while (ii) unconstrained mobility [3,5,16,21,22,23] agents may move independently of protocol messages. In the case of unconstrained mobility, several variants were investigated [3,5,16,21,22,23]: Reischuk [22] considers that malicious agents are stationary for a given period of time, Ostrovsky and Yung [21] introduce the notion of mobile viruses and define the adversary as an entity that can inject and distribute faults; finally, Garay [16], and more recently Banu et al [3], and Sasaki et al [23] or Bonnet et al [5] consider that processes execute synchronous rounds composed of three phases: send, receive, and compute.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations