1980
DOI: 10.1145/322186.322188
|View full text |Cite
|
Sign up to set email alerts
|

Reaching Agreement in the Presence of Faults

Abstract: ABSTRACT. The problem addressed here concerns a set of isolated processors, some unknown subset of which may be faulty, that communicate only by means of two-party messages. Each nonfaulty processor has a private value of reformation that must be communicated to each other nonfanlty processor. Nonfaulty processors always communicate honestly, whereas faulty processors may lie The problem is to devise an algorithm in which processors communicate their own values and relay values received from others that allows… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

2
1,045
0
13

Year Published

2006
2006
2014
2014

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 1,918 publications
(1,060 citation statements)
references
References 3 publications
2
1,045
0
13
Order By: Relevance
“…We consider a general model of computation where t among the set S of server processes on which the data structure is implemented can fail; in this paper, we assume t ≥ 1. A server can fail by crashing, or even by deviating arbitrarily from its algorithm and be malicious (also called Byzantine [26]). We denote by b the number of arbitrary server failures, where 0 ≤ b ≤ t. In this paper, we consider the authenticated arbitrary failure model in which processes can rely on unforgeable digital signatures [28].…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…We consider a general model of computation where t among the set S of server processes on which the data structure is implemented can fail; in this paper, we assume t ≥ 1. A server can fail by crashing, or even by deviating arbitrarily from its algorithm and be malicious (also called Byzantine [26]). We denote by b the number of arbitrary server failures, where 0 ≤ b ≤ t. In this paper, we consider the authenticated arbitrary failure model in which processes can rely on unforgeable digital signatures [28].…”
mentioning
confidence: 99%
“…On invoking a write, the writer increments its timestamp (initialized to 0) and sends a write message with the timestamp to all servers (lines 4-5). Upon receiving the message, servers update the timestamp and send writeack messages back to the writer (lines [22][23][24][25][26][27][28][29]. The writer returns ok once it has received writeack messages from S − t servers (lines 6-7).…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the literature on consensus concerns the presence of processor faults, that can be either crash or Byzantine, starting from the seminal paper [22]; see the recent book [23] for a comprehensive survey. In [18] the authors showed a randomized consensus for crash faults with optimal communication complexity.…”
Section: Related Workmentioning
confidence: 99%
“…For many applications, such as Byzantine Agreement [13,4,16) -the problem of agreeing on a common value in a network with unreliable nodes -randomness itself is simultaneously not enough and too much. Secret sharing, multiparty protocols, reliable decentralized databases, multicasts, and even timestamping protocols can depend very strongly on agreed-upon information in a system.…”
Section: Introductionmentioning
confidence: 99%