New application of reliable agreement: underlying an unsecured business environment
Abstract
References
Recommendations
Reach Reliable Decision by Using Secret Agreement Method
ICPADS '02: Proceedings of the 9th International Conference on Parallel and Distributed SystemsTraditionally, it is very important in delivering thedata with secretly and low cost in a distributedenvironment. Use the reliable method to assist theorganization in communicating with each other needs tobe discussed. Thus, we propose the Two-Phase ...
How Byzantine is a Send Corruption?
Applied Cryptography and Network SecurityAbstractConsensus protocols enable n parties, each holding some input string, to agree on a common output even in the presence of corrupted parties. Recent work has pushed to understand the problem when a majority of parties may be corrupted thus ...
Efficient Byzantine agreement with faulty minority
ASIACRYPT'07: Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information securityByzantine Agreement (BA) among n players allows the players to agree on a value, even when up to t of the players are faulty.
In the broadcast variant of BA, one dedicated player holds a message, and all players shall learn this message. In the ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 139Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in