1987
DOI: 10.1007/bf01667080
|View full text |Cite
|
Sign up to set email alerts
|

Simulating authenticated broadcasts to derive simple fault-tolerant algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
178
0

Year Published

1990
1990
2009
2009

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 195 publications
(180 citation statements)
references
References 16 publications
2
178
0
Order By: Relevance
“…1(b) (to be compared with the "init" round followed by the "echo" round of authenticated broadcast, see [3]). …”
Section: Coordinator For Livenessmentioning
confidence: 99%
See 4 more Smart Citations
“…1(b) (to be compared with the "init" round followed by the "echo" round of authenticated broadcast, see [3]). …”
Section: Coordinator For Livenessmentioning
confidence: 99%
“…Among the latter, two fault models are considered in literature [1]: authenticated Byzantine faults, where messages can be signed by the sending process (with the assumption that the signature cannot be forged by any other process), and Byzantine faults, where there is no mechanism for signatures (but the receiver of a message knows the identity of the sender). 1 Consensus protocols that assume Byzantine faults (without authentication) are harder to develop and prove correct [3]. As a consequence, they tend to be more complicated and harder to understand than the protocols that assume 1 In [2], the latter is called Byzantine faults with oral messages.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations