Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing - PODC '87 1987
DOI: 10.1145/41840.41844
|View full text |Cite
|
Sign up to set email alerts
|

Shifting gears: changing algorithms on the fly to expedite Byzantine agreement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
78
0

Year Published

1989
1989
2011
2011

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 86 publications
(78 citation statements)
references
References 5 publications
0
78
0
Order By: Relevance
“…However, we are going to prove that the problem of deciding in uniform consensus is indeed reducible to the one of stopping in consensus. 2 For that, consider a consensus algorithm A in which each correct process eventually reaches a halting state; A can be transformed into an algorithm B = T (A) which is identical to A, except that each process postpones its decision until it halts (the decision value in B is thus the same as in A).…”
Section: A Lower Bound For Early Stopping Consensusmentioning
confidence: 99%
See 1 more Smart Citation
“…However, we are going to prove that the problem of deciding in uniform consensus is indeed reducible to the one of stopping in consensus. 2 For that, consider a consensus algorithm A in which each correct process eventually reaches a halting state; A can be transformed into an algorithm B = T (A) which is identical to A, except that each process postpones its decision until it halts (the decision value in B is thus the same as in A).…”
Section: A Lower Bound For Early Stopping Consensusmentioning
confidence: 99%
“…We claim that p j needs only t rounds to determine whether p i has failed or not in sending messages at the first round of a run in which at most t − 1 processes crash. For this purpose, we use a strategy known as exponential information gathering (EIG, for short) introduced in [2]. The basic structure used by EIG algorithms is a labelled tree, whose paths from the root represents chains of processes along which some values are propagated.…”
Section: The Edauc and Tree T Algorithmsmentioning
confidence: 99%
“…Our third case study is the well-known EIGByz f [1,15] algorithm, which decides after f + 1 rounds and is designed for synchronous system models. Encoding EIGByz f in the HO model is straightforward.…”
Section: Verifying a Synchronous Algorithmmentioning
confidence: 99%
“…In such a system, every process receives the correct message from at least the non-faulty processes at every round, and therefore the predicate G is satisfied. The standard correctness proof for EIGByz f [1,15] assumes that N > 3f , and therefore N − f > N +f 2 . Since moreover, for any r ∈ N, we obviously have…”
Section: Verifying a Synchronous Algorithmmentioning
confidence: 99%
“…To show that the above functionality is not realized by known protocols, we observe that known broadcast protocols have the following pattern: At the beginning of the protocol the sender p s sends his input x s to the players in P \ {p s }; in a second phase the players try to establish a consistent view on the sender's input. Clearly all protocols which start by the sender sending his input to everybody and then invoke a consensus protocol on the received value, e.g., [CW89,BGP89,BDDS92], are of the above type. However, even the protocols where the second phase is not a self-contained consensus protocol, e.g., the broadcast protocols from [DS82,PW92], also follow the above paradigm.…”
Section: Perfect Security (No Setup)mentioning
confidence: 99%