Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing - STOC '82 1982
DOI: 10.1145/800070.802215
|View full text |Cite
|
Sign up to set email alerts
|

Polynomial algorithms for multiple processor agreement

Abstract: Reaching agreement in a distributed system while handling malfunctioning behavior is a central issue for reliable computer systems. All previous algorithms for reaching the agreement required an exponential number of messages to be sent, with or without authentication.We give polynomial algorithms for reaching (Byzantine) agreement, both with and without the use of authentication protocols. We also prove that no matter what kind of information is exchanged, there is no way to reach agreement with fewer than t+… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
63
0

Year Published

1996
1996
2014
2014

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 117 publications
(64 citation statements)
references
References 8 publications
1
63
0
Order By: Relevance
“…1 Other solutions [DS82,PW92] considered a setting where a setup allowing digital signatures is available, and showed that Broadcast tolerating an arbitrary number of cheaters (t < n) is possible. The suggested protocols are polynomial in the number of players and are as secure as the underlying signature scheme.…”
Section: Summary Of Known Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…1 Other solutions [DS82,PW92] considered a setting where a setup allowing digital signatures is available, and showed that Broadcast tolerating an arbitrary number of cheaters (t < n) is possible. The suggested protocols are polynomial in the number of players and are as secure as the underlying signature scheme.…”
Section: Summary Of Known Resultsmentioning
confidence: 99%
“…2 Recently, Lindell, Lysyanskaya, and Rabin [LLR02] proved that, unless unique session identifiers are available, the bound t < n/3 is necessary for feasibility of concurrently composable Broadcast, even when a setup allowing digital signatures is given. To the positive side, they showed that when unique session IDs are available, then the protocols which achieve Broadcast and use signatures for authentication, e.g., [DS82,PW92] can be be transformed to concurrently composable Broadcast protocols.…”
Section: Summary Of Known Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition to the impossibility of deterministic algorithms in the asynchronous setting mentioned above, there is a sharp lower bound of t rounds for deterministic algorithms in the synchronous setting [13]. This lower bound is proven by assembling a chain of executions where any two adjacent executions are indistinguishable to some non-faulty processor and the two ends of the chain represent different decision values.…”
Section: Related Workmentioning
confidence: 99%