Entry Correia:2006:CAB from compj2000.bib
Last update: Sun Mar 31 02:13:37 MDT 2019
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Correia:2006:CAB,
author = "Miguel Correia and Nuno Ferreira Neves and Paulo
Ver{\'\i}ssimo",
title = "From Consensus to Atomic Broadcast: Time-Free
{Byzantine}-Resistant Protocols without Signatures",
journal = j-COMP-J,
volume = "49",
number = "1",
pages = "82--96",
month = jan,
year = "2006",
CODEN = "CMPJA6",
DOI = "https://doi.org/10.1093/comjnl/bxh145",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Wed Dec 21 17:38:55 MST 2005",
bibsource = "http://comjnl.oxfordjournals.org/content/vol49/issue1/index.dtl;
http://www.math.utah.edu/pub/tex/bib/compj2000.bib",
URL = "http://comjnl.oxfordjournals.org/cgi/content/abstract/49/1/82;
http://comjnl.oxfordjournals.org/cgi/content/full/49/1/82;
http://comjnl.oxfordjournals.org/cgi/reprint/49/1/82",
abstract = "This paper proposes a stack of three
Byzantine-resistant protocols aimed to be used in
practical distributed systems: multi-valued consensus,
vector consensus and atomic broadcast. These protocols
are designed as successive transformations from one to
another. The first protocol, multi-valued consensus, is
implemented on top of a randomized binary consensus and
a reliable broadcast protocol. The protocols share a
set of important structural properties. First, they do
not use digital signatures constructed with public-key
cryptography, a well-known performance bottleneck in
this kind of protocols. Second, they are time-free,
i.e. they make no synchrony assumptions, since these
assumptions are often vulnerable to subtle but
effective attacks. Third, they are completely
decentralized, thus avoiding the cost of detecting
corrupt leaders. Fourth, they have optimal resilience,
i.e. they tolerate the failure of $f =
\lfloor(n-1)/3\rfloor$ out of a total of $n$ processes.
In terms of time complexity, the multi-valued consensus
protocol terminates in a constant expected number of
rounds, while the vector consensus and atomic broadcast
protocols have $O(f)$ complexity. The paper also proves
the equivalence between multi-valued consensus and
atomic broadcast in the Byzantine failure model without
signatures. A similar proof is given for the
equivalence between multi-valued consensus and vector
consensus. These two results have theoretical relevance
since they show once more that consensus is a
fundamental problem in distributed systems.",
acknowledgement = ack-nhfb,
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
}
Related entries
- $n$,
45(3)349,
49(1)97
- assumptions,
43(2)95
- atomic,
49(1)20
- attacks,
45(3)293,
47(2)179,
49(5)554,
50(1)7
- binary,
45(2)243,
45(6)653,
47(2)259
- broadcast,
45(4)410
- Byzantine,
46(1)16
- complexity,
45(3)285,
48(5)504,
51(1)1,
51(1)60,
51(1)102,
51(1)137,
51(3)270,
51(3)372,
51(3)385
- consensus,
46(1)16,
50(1)53
- cost,
44(5)384,
45(3)304,
47(6)673,
48(6)702,
50(5)616
- cryptography,
49(1)97,
51(6)710
- designed,
45(2)243
- detecting,
48(6)651,
48(6)662
- digital,
45(1)88,
46(6)645,
47(4)399,
48(5)514,
50(3)274
- distributed,
44(2)75,
44(3)201,
44(3)214,
44(5)398,
45(4)381,
45(6)595,
45(6)645,
46(2)146,
47(4)475,
48(3)273,
48(5)563,
48(5)602,
49(1)97,
49(3)258,
49(4)418,
50(1)7,
51(2)162,
51(4)497,
52(4)397,
52(6)656
- effective,
49(1)108
- equivalence,
51(2)181
- failure,
43(2)95
- first,
43(1)1,
47(4)399,
48(6)646,
49(4)390,
52(3)378
- have,
43(2)95,
49(3)378
- i.e,
49(1)108
- known, well-,
48(1)49
- leaders,
0(0)xxxvi--412,
47(4)399,
52(6)725
- make,
49(1)108
- model,
0(0)xi--170,
0(0)xxiii--499,
0(0)x--210,
44(2)109,
44(5)410,
45(3)260,
45(3)278,
45(6)608,
46(1)84,
47(1)4,
47(1)58,
47(1)71,
47(1)85,
47(6)728,
49(1)97,
49(1)113,
49(6)650,
49(6)657,
49(6)685,
50(2)232,
50(4)403,
50(5)591,
51(4)419,
51(6)745
- more,
43(2)95,
50(3)348
- not,
45(6)608,
49(1)108
- number,
43(2)95,
43(4)252,
45(2)221,
49(1)97,
51(5)523,
51(5)579,
52(4)461
- often,
43(2)95
- one,
49(1)97
- optimal,
44(5)329,
45(1)88,
47(5)527,
47(5)602,
50(3)332,
52(1)31,
52(2)268,
52(6)646
- paper,
44(3)151,
46(2)z,
46(5)487,
49(1)97,
51(1)z-z
- performance,
43(4)266,
44(3)214,
45(3)278,
45(5)511,
47(4)399,
47(5)527,
48(3)333,
48(3)358,
48(4)385,
49(5)509,
49(6)685,
49(6)744,
51(2)216,
51(6)615,
52(2)186
- practical,
0(0)xi--178,
0(0)xxi--418,
45(6)620,
47(3)395,
48(5)588,
49(6)762,
51(1)7,
51(1)26
- problem,
44(2)101,
44(3)214,
45(2)174,
46(4)427,
47(6)708,
48(6)692,
49(1)108,
49(3)345,
49(3)358,
49(5)585,
49(6)665,
50(4)473,
51(1)102,
51(3)303,
51(3)363,
51(3)372,
52(4)499,
52(5)557
- process,
0(0)xii--274,
0(0)xii--580,
44(2)109,
44(4)230,
44(4)246,
45(1)62,
47(3)396,
50(5)522
- proof,
0(0)xi--420,
47(1)58,
50(5)591
- property,
43(1)13,
44(6)504,
47(1)25,
48(1)4
- propose,
49(1)97
- protocol,
0(0)xi--420,
0(0)xvi--848,
0(0)xxxii--648,
43(1)24,
43(1)65,
44(1)21,
44(3)201,
44(5)448,
44(5)463,
45(1)46,
45(1)101,
45(2)162,
46(2)146,
46(2)193,
46(2)z,
46(4)421,
47(4)507,
48(1)27,
48(3)333,
48(4)480,
49(2)190,
49(2)251,
49(5)541,
49(6)710,
50(1)41,
50(2)204,
50(5)589,
50(5)591,
50(5)602,
52(2)186,
52(4)461,
52(4)483
- prove,
49(1)97
- randomized,
0(0)xii--274,
45(5)561,
46(5)498,
47(2)245,
48(2)200,
49(2)249
- reliable,
46(2)146,
46(5)467
- result,
43(6)439,
47(6)627,
49(1)108
- second,
48(3)379,
49(5)629,
50(2)151
- set,
0(0)xv--387,
46(4)401,
47(2)245
- share,
49(1)97
- show,
49(1)97
- signatures,
49(3)322
- stack,
48(5)565
- structural,
43(6)469,
51(2)240
- terminate,
49(1)108
- theoretical,
47(6)627,
49(1)130,
49(2)249
- Third,
49(3)376,
50(3)254,
3671(0)x--236
- three,
51(5)566,
52(6)599
- time,
44(1)31,
44(4)292,
46(1)84,
47(5)511,
49(6)731,
51(4)451,
51(4)511,
51(6)745,
52(5)530
- transformation,
48(4)421
- two,
49(1)97
- use,
0(0)xiii--483,
44(6)531,
48(1)4,
51(1)26,
52(3)288
- used,
49(1)108
- well-known,
48(1)49