Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/296806.296824acmconferencesArticle/Chapter ViewAbstractPublication PagesosdiConference Proceedingsconference-collections
Article

Practical Byzantine fault tolerance

Published: 22 February 1999 Publication History
  • Get Citation Alerts
  • Abstract

    No abstract available.

    References

    [1]
    M. Bellare and D. Micciancio. A New Paradigm for Collisionfree Hashing: Incremental@ at Reduced Cost. In Advances in Cryprology - Eurocrypr 97,1997.]]
    [2]
    G. Bracha and S. Toueg. Asynchronous Consensus and Broadcast Protocols. Journal oft/w ACM, 32(4), 1995.]]
    [3]
    R. Canneti and T. Rabin. Optimal Asynchronous Byzantine Agreement. Technical Report #92-15, Computer Science Department, Hebrew University, 1992.]]
    [4]
    M. Castro and B. Liskov. A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm. Technical Memo MIT/LCSmM-590, MIT Laboratory for Computer Science, 1999.]]
    [5]
    M. Castro and B. Liskov. Authenticated Byzantine Fault Tolerance Without Public-Key Cryptography. Technical Memo MIT/LCS/TM-589, MIT Laboratory for Computer Science, 1999.]]
    [6]
    E Cristian. H. Aghili, H. Strong, and D. Dolev. Atomic Broadcast: From Simple Message Diffusion to Byzantine Agreement. In Inrernarional Conference on Fault Tolerant Computing, 1985.]]
    [7]
    S. Deering and D. Cheriton. Multicast Routing in Datagram Intemetworks and Extended LANs. ACM Transacrions on Computer Systems, 8(2), 1990.]]
    [8]
    H. Dobbertin. The Status of MD5 After a Recent Attack. RSA Laboratories CryproByres, 2(2), 1996.]]
    [9]
    M. Fischer, N. Lynch, and M. Paterson. Impossibility of Distributed Consensus With One Faulty Process. Journal of the ACM, 32(2), 1985.]]
    [10]
    J. Gamy and Y. Moses. Fully Polynomial Byzantine Agreement for n >3t Processors in t+l Rounds. SIAM Journal of Computing, 27(l), 1998.]]
    [11]
    D. Gawlick and D. Kinkade. Varieties of Concurrency Control in IMSNS Fast Path. Da&base Engineering, 8(2), 1985.]]
    [12]
    D. Gifford. Weighted Voting for Replicated Data. in Symposium on Operating Systems Principles, 1979.]]
    [13]
    M. Herlihy and J. Spar. How to make replicated data secure. Advances in Cryprology (UVCS 293). 1988.]]
    [14]
    M. Herhhy and J. Wing. Axioms for Concurrent Objects. In ACM Symposium on Principles of Programming Languages, 1987.]]
    [15]
    J. Howard et al. Scale and performance in a distributed file system. ACM Transactions on Cornpurer Systems, 6(l), 1988.]]
    [16]
    K. KihIstrom, L. Moser, and P. MeUiar-Smith. The SecureRing Protocols for Securing Group Communication. In Hawaii International Conference on System Sciences, 1998.]]
    [17]
    L. Lamport. Tie, Clocks, and the Ordering of Events in a Distributed System. Commun. ACM, 21(7), 1978.]]
    [18]
    L. Lamport. The Part-Time Parliament. Technical Repolt 49, DEC Systems Research Center, 1989.]]
    [19]
    L. Lamport, R. Shostak, and M. Pease. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Sysrems, 4(3), 1982.]]
    [20]
    B. Liskov et al. Replication in the Harp File System. In ACM Symposium on Operating System Principles, 1991.]]
    [21]
    N. Lynch. Distributed Algorihms. Morgan Kaufmann Publishers, 1996.]]
    [22]
    D. Malkhi and M. Reiter. A High-Throughput Secure Reliable Multicast Protocol. In Computer Security Fouruiations Workshop, 1996.]]
    [23]
    D. MaIkhi and M. Reiter. Byzantine Quorum Systems. In ACM Symposium on Theory of Computing, 1997.]]
    [24]
    D. Malkhi and M. Reiter. Unreliable Intrusion Detection in Distributed Computations. In Cornpurer Securiry Fourufations Workshop, 1997.]]
    [25]
    D. Malkhi and M. Reiter. Secure and Scalable Replication in Phalanx. In IEEE Symposium on Reliable Distributed Sysrems, 1998.]]
    [26]
    B. Oki and B. Liskov. Viewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems. In ACM Symposium on Principles of Distributed Computing, 1988.]]
    [27]
    B. Preneel and P. Oorschot. MDx-MAC and Building Fast MACs from Hash Functions. In Crypro 95,1995.]]
    [28]
    C. Pu, A. Black, C. Cowan, and J. Walpole. A Specialization TooIkit to Increase the Diversity of Operating Systems. In ICMAS Workshop on Immunity-Based Sysrems, 1996.]]
    [29]
    M. Reiter. Secure Agreement Protocols. In ACM Conference on Computer and Communication Securiky, 1994.]]
    [30]
    M. Reiter. The Rampart Toolkit for Building High-Integrity Services. Theory and Practice in Distributed System (LNCS 938), 1995.]]
    [31]
    M. Reiter. A Secure Group Membership Protocol. IEEE Transactions on Sojiware Engineering, 22(l), 1996.]]
    [32]
    R. Rivest. The MD5 Message-Digest Algorithm. Internet RFC- 1321.1992.]]
    [33]
    R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of he ACM, 21(2), 1978.]]
    [34]
    F. Schneider. Implementing Fault-Tolerant Services Using The State Machine Approach: A Tutorial. ACM Computing Surveys, 22(4), 1990.]]
    [35]
    A. Shamir. How to share a secret. Communications of the ACM, 22(11), 1979.]]
    [36]
    G. Tsudii. Message Authentication with One-Way Hash Functions. ACM Computer Communications Review, 22(5), 1992.]]
    [37]
    M. Wiener. Performance Comparison of Public-Key Cryptosystems. RSA Laboratories' CryptoBytes, 4(l), 1998.]]

    Cited By

    View all
    • (2024)BAR Nash Equilibrium and Application to Blockchain DesignProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3663185(2435-2437)Online publication date: 6-May-2024
    • (2024)Swiper: a new paradigm for efficient weighted distributed protocolsProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662799(283-294)Online publication date: 17-Jun-2024
    • (2024)Lumiere: Making Optimal BFT for Partial Synchrony PracticalProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662787(135-144)Online publication date: 17-Jun-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    OSDI '99: Proceedings of the third symposium on Operating systems design and implementation
    February 1999
    278 pages
    ISBN:1880446391

    Sponsors

    Publisher

    USENIX Association

    United States

    Publication History

    Published: 22 February 1999

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)BAR Nash Equilibrium and Application to Blockchain DesignProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3663185(2435-2437)Online publication date: 6-May-2024
    • (2024)Swiper: a new paradigm for efficient weighted distributed protocolsProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662799(283-294)Online publication date: 17-Jun-2024
    • (2024)Lumiere: Making Optimal BFT for Partial Synchrony PracticalProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662787(135-144)Online publication date: 17-Jun-2024
    • (2024)TetraBFT: Reducing Latency of Unauthenticated, Responsive BFT ConsensusProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662783(257-267)Online publication date: 17-Jun-2024
    • (2024)Inductive Diagrams for Causal ReasoningProceedings of the ACM on Programming Languages10.1145/36498308:OOPSLA1(529-554)Online publication date: 29-Apr-2024
    • (2024)Bigger, not Badder: Safely Scaling BFT ProtocolsProceedings of the 11th Workshop on Principles and Practice of Consistency for Distributed Data10.1145/3642976.3653033(30-36)Online publication date: 22-Apr-2024
    • (2024)AlterEgoProceedings of the 7th International Workshop on Edge Systems, Analytics and Networking10.1145/3642968.3654814(7-12)Online publication date: 22-Apr-2024
    • (2024)TriSAS: Toward Dependable Inter-SAS Coordination with AuditabilityProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3645005(399-411)Online publication date: 1-Jul-2024
    • (2024)Dashing and Star: Byzantine Fault Tolerance with Weak CertificatesProceedings of the Nineteenth European Conference on Computer Systems10.1145/3627703.3650073(250-264)Online publication date: 22-Apr-2024
    • (2024)Stable Blockchain Sharding under Adversarial Transaction GenerationProceedings of the 36th ACM Symposium on Parallelism in Algorithms and Architectures10.1145/3626183.3659970(451-461)Online publication date: 17-Jun-2024
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media