Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing 2012
DOI: 10.1145/2332432.2332490
|View full text |Cite
|
Sign up to set email alerts
|

On the (limited) power of non-equivocation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 46 publications
(52 citation statements)
references
References 13 publications
0
52
0
Order By: Relevance
“…Alternatively, one can assume a constant number of synchronous communication rounds after the synchronization point and run constant expected round synchronous agreement protocols [31]. -Non-equivocation Mechanism: In [18,2] it is shown how to design agreement protocols with t < n/2 in an asynchronous setting, provided there is a mechanism to enforce "non-equivocation". On a very high level, such a mechanism prevents a corrupted party to transmit conflicting messages to honest parties; however a corrupted party may send messages to certain number of parties and decide not to communicate to the rest of the parties.…”
Section: Realizing F Prep With Abort In the Partial Synchronous Setmentioning
confidence: 99%
See 1 more Smart Citation
“…Alternatively, one can assume a constant number of synchronous communication rounds after the synchronization point and run constant expected round synchronous agreement protocols [31]. -Non-equivocation Mechanism: In [18,2] it is shown how to design agreement protocols with t < n/2 in an asynchronous setting, provided there is a mechanism to enforce "non-equivocation". On a very high level, such a mechanism prevents a corrupted party to transmit conflicting messages to honest parties; however a corrupted party may send messages to certain number of parties and decide not to communicate to the rest of the parties.…”
Section: Realizing F Prep With Abort In the Partial Synchronous Setmentioning
confidence: 99%
“…So such a mechanism is strictly weaker than the broadcast primitive. In [18,2] it is also discussed how such a non-equivocation mechanism can be securely realized assuming a trusted hardware module with each party. One can use such a non-equivocation mechanism to agree about the status of Π PREP .…”
Section: Realizing F Prep With Abort In the Partial Synchronous Setmentioning
confidence: 99%
“…In particular, these systems employ transferable non-equivocation, which (similar to digital signatures) allows a party to verifiably transfer a non-equivocation tag (or signature) provided by a sender to other parties. Clement et al [CJKR12] justify the necessity of transferability of non-equivocation by proving that non-equivocation or signature alone are powerless in asynchronous distributed systems. Nevertheless, (transferable) non-equivocation has not been formalized so far, and we present a simplified, idealized definition for transferable non-equivocation.…”
Section: Definitionsmentioning
confidence: 99%
“…Clement et al [8] formally prove that both non-equivocation and transferable authentication are required to reduce BFT replication cost to 2 f + 1. Transferable authentication is necessary because in a 2 f + 1 replica group, in the worst case, only one correct replica has the correct protocol message.…”
Section: Related Workmentioning
confidence: 99%
“…Transferable authentication is also required: each node must be able not only to authenticate a message from another node, but also to forward the message to a third node that will also be able to authenticate it. This requirement was recently formally proven by Clement et al [8]. What this means in practice for this class of protocols is that their trusted components require expensive digital signatures for attestation (the MAC-based authenticators pioneered in PBFT [4] are not sufficient).…”
Section: Introductionmentioning
confidence: 99%