Practical Byzantine fault tolerance
Citations
[...]
4,816 citations
Cites background from "Practical Byzantine fault tolerance..."
...Many systems [3, 4, 8, 10, 17, 18, 29, 34, 36] replicate computational or storage tasks among several remote sites to protect against integrity violations (data loss)....
[...]
3,376 citations
Cites methods from "Practical Byzantine fault tolerance..."
...We hope to extend the protocol in [10] to use such techniques....
[...]
...Assuming that a Byzantine agreement protocol like that in [10] is used, the total cost an update in bytes sent across the network, b, is given by the equation:...
[...]
3,129 citations
Cites background or methods from "Practical Byzantine fault tolerance..."
...5If more than 3f + 1 nodes are used, then the quorum thresholds listed in [26] may lead to forks....
[...]
...Tendermint vs PBFT—Tendermint....
[...]
...Sieve [38], a mechanism used in the HyperLedger Fabric project, augments the PBFT algorithm [26] by adding speculative execution and verification phases, inspired by the execute-verify architecture presented in [39]....
[...]
...Tendermint [32] provides BFT tolerance and is similar to the PBFT algorithm; however it provides a tighter guarantee with regards to the results returned to the client when more than one third of the nodes are faulty, and allows for a dynamically changing set of set of validators, and leaders that can be rotated in a round-robin manner, among other optimizations [33]....
[...]
...PBFT works on the assumption that less than one third of the nodes are faulty (f ), which is why say that it requires at least5 3f + 1 nodes....
[...]
2,946 citations
Cites background from "Practical Byzantine fault tolerance..."
...The Sybil attack is especially threatening to fault-tolerant schemes such as distributed storage [27], dispersity [28] and multipath [29] routing, and topology maintenance [30, 31]....
[...]
2,661 citations
Cites background from "Practical Byzantine fault tolerance..."
...In [2], Castro and Liskov extend the replicated state-machine approach [41] to achieve Byzantine fault tolerance....
[...]
References
14,659 citations
14,340 citations
"Practical Byzantine fault tolerance..." refers background in this paper
...It is possible to use secret sharing schemes [35] to obtain privacy even in the presence of a threshold of malicious replicas [13] for the arguments and portions of the state that are opaque to the service operations....
[...]
8,381 citations
5,208 citations
4,901 citations