Loading [MathJax]/extensions/MathZoom.js
Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries | IEEE Conference Publication | IEEE Xplore

Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries


First Page of the Article

Date of Conference: 22-25 June 2003
Date Added to IEEE Xplore: 09 July 2003
Print ISBN:0-7695-1952-0
Conference Location: San Francisco, CA, USA

First Page of the Article

Citations are not available for this document.

1 Introduction

Fault-tolerant protocols are important for networked distributed systems that must cope with unreliable components. A fundamental primitive for synchronization among a group of parties is reliable broadcast, where a distinguished party broadcasts a value to the other parties; if the sender is correct, then all non-faulty parties should accept , and if the sender is faulty, all non-faulty parties should decide for the same value or not terminate the protocol at all. In asynchronous networks, which are the focus of this paper, no assumptions are made about network delays and the relative execution speed of the parties.

Cites in Papers - |

Cites in Papers - IEEE (5)

Select All
1.
Alejandro Ranchal-Pedrosa, Vincent Gramoli, "ZLB: A Blockchain to Tolerate Colluding Majorities", 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.209-222, 2024.
2.
Alejandro Ranchal-Pedrosa, Vincent Gramoli, "Basilic: Resilient-Optimal Consensus Protocols with Benign and Deceitful Faults", 2023 IEEE 36th Computer Security Foundations Symposium (CSF), pp.91-106, 2023.
3.
Aniket Kate, Ian Goldberg, "Distributed Key Generation for the Internet", 2009 29th IEEE International Conference on Distributed Computing Systems, pp.119-128, 2009.
4.
Gengming Zhu, Shaobo Zhang, "Image Information Hiding Design and Implementation", 2009 International Symposium on Information Engineering and Electronic Commerce, pp.130-134, 2009.
5.
P. Moulin, J.A. O'Sullivan, "Information-theoretic analysis of information hiding", IEEE Transactions on Information Theory, vol.49, no.3, pp.563-593, 2003.

Cites in Papers - Other Publishers (1)

1.
John C. Knight, Elisabeth A. Strunk, Architecting Dependable Systems II, vol.3069, pp.51, 2004.
Contact IEEE to Subscribe

References

References is not available for this document.