2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS) 2021
DOI: 10.1109/icdcs51616.2021.00055
|View full text |Cite
|
Sign up to set email alerts
|

Practical Byzantine Reliable Broadcast on Partially Connected Networks

Abstract: Where a licence is displayed above, please note the terms and conditions of the licence govern your use of this document.When citing, please reference the published version. Take down policy While the University of Birmingham exercises care and attention in making items available there are rare occasions when an item has been uploaded in error or has been deemed to be commercially or otherwise sensitive.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…Multicast queries to these copies and waiting for their responses will be possible. Node information has been updated, and the network's current number of active nodes is known after running NDC protocols [26][27] [28].…”
Section: A Reply From the Customermentioning
confidence: 99%
“…Multicast queries to these copies and waiting for their responses will be possible. Node information has been updated, and the network's current number of active nodes is known after running NDC protocols [26][27] [28].…”
Section: A Reply From the Customermentioning
confidence: 99%
“…In the context of Reliable Broadcast, there are (non-self-stabilizing) Byzantine fault-tolerant (BFT) solutions [1,13,14] and (non-BFT) self-stabilizing solutions [15] (even for total order broadcast [15][16][17][18]). We focus on BT [4,5] to which we propose a self-stabilizing variation.…”
Section: Related Workmentioning
confidence: 99%
“…Signatures provide us with a network-wide non-repudiation mechanism: if a Byzantine process issues two conflicting imp-messages to two different subsets of correct processes, then the correct processes can detect the malicious behavior by disclosing to each other the Byzantine signed imp-messages. 6…”
Section: Message Adversarymentioning
confidence: 99%
“…when BUNDLE(m, sn, j, sigs) is received do (3) if (−, sn, j) not already mbrb-delivered ∧ sigs contains the valid signature for (m, sn, j) by pj then (4) save all unsaved valid signatures for (m, sn, j) of sigs; (5) if (−, sn, j) not already signed by pi then (6) save signature for (m, sn, j) by pi; (7) broadcast BUNDLE(m, sn, j, {all saved signatures for (m, sn, j)}) (8) end if; (9) if strictly more than n+t 2 signatures for (m, sn, j) are saved then (10) broadcast BUNDLE(m, sn, j, {all saved signatures for (m, sn, j)}); (11) mbrb_deliver(m, sn, j) (12) end if (13) end if.…”
Section: Algorithmmentioning
confidence: 99%
See 1 more Smart Citation