نتایج جستجو برای: byzantine attack

تعداد نتایج: 83821  

Journal: :IACR Cryptology ePrint Archive 2008
Anuj Gupta Prasant Gopal Piyush Bansal K. Srinathan

Pease et al. introduced the problem of Byzantine Generals (BGP) to study the effects of Byzantine faults in distributed protocols for reliable broadcast. It is well known that BGP among n players tolerating up to t faults is (efficiently) possible if and only if n > 3t. To overcome this severe limitation, Pease et al. introduced a variant of BGP, Authenticated Byzantine General (ABG). Here play...

2006
Peter Druschel Andreas Haeberlen Petr Kuznetsov

ing out Byzantine Behavior Peter Druschel, Andreas Haeberlen, Petr Kouznetsov Max Planck Institute for Software Systems MPI-SWS, Stuhlsatzenhausweg 85, 66123 Saarbrücken, Germany {druschel,ahae,pkouznet}@mpi-sws.mpg.de Abstract. Many distributed systems are designed to tolerate the presence of Byzantine failures: an individual process may arbitrarily deviate Many distributed systems are designe...

2013
Lewis Tseng Nitin Vaidya

Consider a synchronous point-to-point network of n nodes connected by directed links, wherein each node has a binary input. This paper proves a tight necessary and sufficient condition for achieving Byzantine consensus among these nodes in the presence of up to f Byzantine faults. We derive two forms of the necessary condition. We provide a constructive proof of sufficiency by presenting a Byza...

Journal: :CoRR 2015
Moumen Hamouma

To circumvent the FLP impossibility result in a deterministic way several protocols have been proposed on top of an asynchronous distributed system enriched with additional assumptions. In the context of Byzantine failures for systems where at most t processes may exhibit a Byzantine behavior, two approaches have been investigated to solve the consensus problem.The first, relies on the addition...

2013
Silvia Bonomi Antonella Del Pozzo Roberto Baldoni

We consider a system with n processes where some of them can show a byzantine behavior. A byzantine process can deviate arbitrarily from the protocol, e.g., dropping messages, changing the content of a message (different recipients may receive different content of the same broadcast message), delivering messages not sent by any process or creating fake messages. This paper introduces a new broa...

Journal: :CoRR 2012
Lewis Tseng Nitin H. Vaidya

For synchronous point-to-point n-node networks of undirected links, it has been previously shown that, to achieve consensus in presence of up to f Byzantine faults, the following two conditions are together necessary and sufficient: (i) n ≥ 3f + 1 and (ii) network connectivity greater than 2f . The first condition, that is, n ≥ 3f + 1, is known to be necessary for directed graphs as well. On th...

2003
Ariel Daliot Danny Dolev Hanna Parnas

Awareness of the need for robustness in distributed systems increases as distributed systems become an integral part of day-to-day systems. Tolerating Byzantine faults and possessing self-stabilizing features are sensible and important requirements of distributed systems in general, and of a fundamental task such as clock synchronization in particular. There are efficient solutions for Byzantin...

2010
Bhavitavya B. Bhadviya

Byzantine fault is a cumulative term given to the set of both permanent and transient faults caused in circuits which effectively present themselves as different errors at different nodes in the same circuit. Such faults have become significant with the shrinkage in node (process) technology with process variations, radiation strikes and quantummechanical effects being majorly responsible for c...

2010
Alysson Neves Bessani Paulo Sousa Miguel Correia

This paper outlines a flexible suite of object replication protocols that brings together Byzantine quorum systems registers and state machine replication. These protocols enable the implementation of Byzantine fault-tolerant applications that make minimal assumptions about the environment and that run in at most two more communication steps in almost all cases of non-favorable executions (in c...

Journal: :Inf. Process. Lett. 2007
Ittai Abraham Gregory V. Chockler Idit Keidar Dahlia Malkhi

We consider the problem of implementing a wait-free regular register from storage components prone to Byzantine faults. We present a simple, efficient, and self-contained construction of such a register. Our construction utilizes a novel building block, called a 1-regular register, which can be efficiently implemented from Byzantine fault-prone components.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید