2014
DOI: 10.1007/s00446-014-0224-5
|View full text |Cite
|
Sign up to set email alerts
|

On the complexity of asynchronous agreement against powerful adversaries

Abstract: We introduce new techniques for proving lower bounds on the running time of randomized algorithms for asynchronous agreement against powerful adversaries. In particular, we define a strongly adaptive adversary that is computationally unbounded and has a limited ability to corrupt a dynamic subset of processors by erasing their memories. We demonstrate that the randomized agreement algorithms designed by Ben-Or and Bracha to tolerate crash or Byzantine failures in the asynchronous setting extend to defeat a str… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…Connection to the full-information model. The public-randomness model can be viewed as a restricted form of the full-information model [17,8,32,5,9,35,38,44,41,45]. In the latter model, the adversary is computationally unbounded and has complete access to all the information in the system, i.e., it can listen to all transmitted messages and view the internal states of honest parties (such an adversary is also called intrusive [17]).…”
Section: On the Round Complexity Of Randomized Byzantine Agreementmentioning
confidence: 99%
“…Connection to the full-information model. The public-randomness model can be viewed as a restricted form of the full-information model [17,8,32,5,9,35,38,44,41,45]. In the latter model, the adversary is computationally unbounded and has complete access to all the information in the system, i.e., it can listen to all transmitted messages and view the internal states of honest parties (such an adversary is also called intrusive [17]).…”
Section: On the Round Complexity Of Randomized Byzantine Agreementmentioning
confidence: 99%
“…Connection to the full-information model. The public-randomness model can be viewed as a restricted form of the full-information model [17,7,32,5,9,33,37,43,40,44]. In the latter model, the adversary is computationally unbounded and has complete access to all the information in the system, i.e., it can listen to all transmitted messages and view the internal states of honest parties (such an adversary is also called intrusive [17]).…”
Section: The Modelmentioning
confidence: 99%