Generalized Communication and Security Models in Byzantine Agreement
Diese Seite wurde seit 21 Jahren inhaltlich nicht mehr aktualisiert.
Unter Umständen ist sie nicht mehr aktuell.
Zusammenfassungen
Consider a set of locally separated parties that do not trust each other and that can only communicate bilaterally. Furthermore, consider a designated sender among them who is to consistently distribute a message to all parties in the set. Is there a protocol among the parties that allows for the reliable distribution of this message even when the sender and possibly some other parties are cheating by deviating from the protocol? Reliability thereby means that all honest parties are guaranteed to receive the same message, and that this is the original message chosen by the sender if the sender is honest himself. This problem is a special case of the so-called Byzantine agreement problem. Byzantine agreement is an important building block for fault-tolerant distributed computing and cryptographic protocols.
This work starts with an overview over existing models and variations of this problem and the discussion of some fundamental well-known solutions to the problem as well as respective impossibility results. Thereby, often an alternative, more intuitive representation is chosen than was done before. Finally, some natural generalizations of the problem are introduced and solved.
Von Klappentext im Buch Generalized Communication and Security Models in Byzantine Agreement This work starts with an overview over existing models and variations of this problem and the discussion of some fundamental well-known solutions to the problem as well as respective impossibility results. Thereby, often an alternative, more intuitive representation is chosen than was done before. Finally, some natural generalizations of the problem are introduced and solved.
Dieses Buch erwähnt ...
Personen KB IB clear | Martin Hirt | ||||||||||||||||||
Begriffe KB IB clear | Kommunikationcommunication , Komplexitätcomplexity , Monte-Carlo-Algorithmen , Public Key Kryptographie , Sicherheitsecurity | ||||||||||||||||||
Bücher |
|
Standorte
Anderswo suchen
Beat und dieses Buch
Beat war Co-Leiter des ICT-Kompetenzzentrums TOP während er dieses Buch ins Biblionetz aufgenommen hat. Nach Abschluss seiner Dissertation hat Beat dieses Buch nicht mehr bearbeitet. Beat besitzt ein physisches, aber kein digitales Exemplar. Aufgrund der wenigen Einträge im Biblionetz scheint er es nicht wirklich gelesen zu haben. Es gibt bisher auch nur wenige Objekte im Biblionetz, die dieses Werk zitieren.