2021
DOI: 10.1007/978-3-030-92075-3_19
|View full text |Cite
|
Sign up to set email alerts
|

Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 27 publications
1
6
0
Order By: Relevance
“…The parties in Z c may send echo messages for m ′ , where m ′ = m. Similarly, the parties in Z c may send ready messages for m ′ , where m ′ = m. However, since Z c ∈ Z, and since P \ Z c = H ∈ Z, no honest party ever generates a ready message for m ′ , neither in step 3, nor in step 4. 10 This also proves the liveness property.…”
Section: A1 Asynchronous Reliable Broadcast With Weak Synchronous Gua...supporting
confidence: 53%
See 1 more Smart Citation
“…The parties in Z c may send echo messages for m ′ , where m ′ = m. Similarly, the parties in Z c may send ready messages for m ′ , where m ′ = m. However, since Z c ∈ Z, and since P \ Z c = H ∈ Z, no honest party ever generates a ready message for m ′ , neither in step 3, nor in step 4. 10 This also proves the liveness property.…”
Section: A1 Asynchronous Reliable Broadcast With Weak Synchronous Gua...supporting
confidence: 53%
“…The works of [9] and [11,17] show that the condition 2t s + t a < n is necessary and sufficient for best-of-both-worlds cryptographically-secure BA and MPC respectively, tolerating computationally bounded adversaries. Using the same condition, [10] presents a best-of-bothworlds cryptographically-secure atomic broadcast protocol. The work of [28] studies Byzantine fault tolerance and state machine replication protocols for multiple thresholds, including t s and t a .…”
Section: Other Related Workmentioning
confidence: 99%
“…Network-Agnostic Protocols: A Blueprint. To design an efficient networkagnostic DKG protocol, a natural approach is to follow the template of previous works [BKL19,BLL20,BKL21]. Here, the protocol is divided into two components, a synchronous component Π s and an asynchronous component Π a .…”
Section: Background and Starting Pointmentioning
confidence: 99%
“…We answer these questions in the affirmative. Our contributions are motivated by a series of recent works on network-agnostic protocols for various types of consensus [BKL19,BKL21] and multi-party computation [BLL20,ABKL22a,ACC22a] (MPC). Existing protocols, however, strongly rely on trusted setup, particularly in the form of threshold cryptosystems [BLL20,DHLZ21].…”
mentioning
confidence: 99%
“…Orthogonally, protocols in [1], [45], [46], [47] achieve the respective optimal safety and liveness resiliences under different network conditions (synchrony, asynchrony), but without allowing clients flexibility to choose resilience pairs. Flexible protocols: FBFT [14] allows clients to not only choose resilience pairs, but also choose different network assumptions (synchronous or partially synchronous).…”
Section: Related Workmentioning
confidence: 99%