Authenticated Byzantine Fault Tolerance Without Public-Key Cryptography
Citations
3,562 citations
Additional excerpts
...The modified algorithm is described in [5]....
[...]
177 citations
Additional excerpts
...3f+1, atomic [ 5 ]2 3f+1, atomic2 3f+1 for safe 3f+1, regular [12],[15]1; or stronger semantics con rmable, self-verifying 3f+1, atomic [13],[6]1;2 3f+1, atomic2 non-conrma ble, generic 3f+1, safe [15] 2f+1, regular2 2f+1 for safe non-conrmable , self-verifying 2f+1, regular [15] 2f+1, regular2 or stronger semantics...
[...]
132 citations
70 citations
Cites methods from "Authenticated Byzantine Fault Toler..."
...EPOCH-CHANGE message follows the structure of PBFT VIEW-CHANGE message (page 411, [23]) with the difference that it is signed and that there are no VIEW-CHANGE-ACK messages exchanged (to streamline and simplify the implementation similarly to [21])....
[...]
69 citations
References
14,659 citations
"Authenticated Byzantine Fault Toler..." refers background or methods in this paper
...The cryptographic techniques we use are thought to have these properties [28, 30, 27]....
[...]
...Our messages contain public-key signatures [28], message authentication codes [30], and message digests produced by collision-resistant hash functions [27]....
[...]
8,381 citations
4,389 citations
"Authenticated Byzantine Fault Toler..." refers background in this paper
...) This is a rather weak synchrony assumption that is likely to be true in any real system provided network faults are eventually repaired, yet it enables us to circumvent the impossibility result in [9]....
[...]
...Therefore, it must rely on synchrony to provide liveness; otherwise it could be used to implement consensus in an asynchronous system, which is not possible [9]....
[...]
4,340 citations
3,562 citations
"Authenticated Byzantine Fault Toler..." refers background or methods in this paper
...We have implemented a Byzantine-fault-tolerant NFS file system and it performs less than 3% slower than a standard, unreplicated implementation of NFS [5]....
[...]
...They are repeated here for completeness and because the version of the algorithm with public-key signatures is easier to understand, but can be skipped by a reader that is familiar with the algorithm in [5]....
[...]
...The number of message delays introduced by our algorithm between the moment the client sends a request and receives a reply is only 4 for read-write requests and 2 for read-only requests [5]....
[...]
...Copy-on-write techniques can be used to reduce the space overhead to store the extra copies of the state, as was done in [5]....
[...]
...In our current implementation [5], session keys are 16 bytes....
[...]