2012
DOI: 10.1007/978-3-642-35476-2_24
|View full text |Cite
|
Sign up to set email alerts
|

Byzantine Chain Replication

Abstract: Abstract. We present a new class of Byzantine-tolerant State Machine Replication protocols for asynchronous environments that we term Byzantine Chain Replication. We demonstrate two implementations that present different trade-offs between performance and security, and compare these with related work. Leveraging an external reconfiguration service, these protocols are not based on Byzantine consensus, do not require majoritybased quorums during normal operation, and the set of replicas is easy to reconfigure. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
6
2
2

Relationship

2
8

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 29 publications
(30 reference statements)
0
11
0
Order By: Relevance
“…Students' efforts in completing projects also contributed to publications for the International Conference on Principles of Distributed Systems [2]; the Euromicro International Conference on Parallel, Distributed and Network-Based Processing [3]; the USENIX Symposium on Networked Systems Design and Implementation [4]; the IEEE/IFIP International Conference on Dependable Systems and Networks [5]; as well as several student undergraduate and master's degree research projects. Overall, the work completed in each of the projects under this award was a success, and the students involved will benefit from this exposure as they advance to the next steps in their career paths.…”
Section: Discussionmentioning
confidence: 99%
“…Students' efforts in completing projects also contributed to publications for the International Conference on Principles of Distributed Systems [2]; the Euromicro International Conference on Parallel, Distributed and Network-Based Processing [3]; the USENIX Symposium on Networked Systems Design and Implementation [4]; the IEEE/IFIP International Conference on Dependable Systems and Networks [5]; as well as several student undergraduate and master's degree research projects. Overall, the work completed in each of the projects under this award was a success, and the students involved will benefit from this exposure as they advance to the next steps in their career paths.…”
Section: Discussionmentioning
confidence: 99%
“…Full BFT protocols, such as Shuttle [22] or BChain [10] can be used to also implement full consensus with a chain based protocol. However, other than RelBC, these protocols rely on view change and an eventually correct leader to guarantee LC2, even with a single proposer.…”
Section: The Bft-publishermentioning
confidence: 99%
“…Their main objective is to improve replication cell performance by distributing consistency management responsibilities among servers. These approaches include different variants of Paxos such as Multi-Paxos [16 and 17], Fast Paxos [27], Mencius [28], generalized Paxos [29], EPaxos [30], Object Ownership Distribution (OOD) [13], and chain replication [32][33][34][35][36].…”
Section: Related Workmentioning
confidence: 99%