skip to main content
column

Scalable byzantine computation

Published:03 September 2010Publication History
First page image

References

  1. M. Abd-El-Malek, G. Ganger, G. Goodson, M. Reiter, and J. Wylie. Fault-scalable Byzantine faulttolerant services. ACM SIGOPS Operating Systems Review, 39(5):74, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. I. Abraham, D. Dolev, R. Gonen, and J. Halper. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In Principles of Distributed Computing( PODC), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. I. Abraham, D. Dolev, and J. Halper. Lower bounds on implementing robust and resilient mediators. In IACR Theory of Cryptography Conference(TCC), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer. Farsite: Federated, available, and reliable storage for an incompletely trusted environment. In Proceedings of the 5th Annual Symposium on Operating Systems Design and Implementation (OSDI), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Anderson and T. Moore. The economics of information security. Science, 314(5799):610--613, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  6. R. Anderson and T. Moore. Information security economics - and beyond. In CRYPTO, pages 68--91, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. J. Anderson. Why information security is hard-an economic perspective. In ACSAC, pages 358--365. IEEE Computer Society, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Aspnes. Lower bounds for distributed coin-flipping and randomized consensus. Journal of the Association for Computing Machinery, 45(3):415--450, May 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Aspnes, K. Chang, and A. Yampolskiy. Inoculation strategies for victims of viruses and the sum-of-squares partition problem. Journal of Computer and System Science, 72(6):1077--1093, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H. Attiya and K. Censor. Tight bounds for asynchronous randomized consensus. J. ACM, 55(5), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. Awerbuch and C. Scheideler. Towards a scalable and robust dht. Theory Comput. Syst., 45(2):234- 260, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Ben-Or. Another advantage of free choice (Extended Abstract): Completely asynchronous agreement protocols. In Proceedings of the second annual ACM symposium on Principles of distributed computing, pages 27--30. ACM New York, NY, USA, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. F. Berman, G. Fox, and A. Hey. Grid computing: making the global infrastructure a reality. John Wiley & Sons Inc, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. V. Bhandari and N. H. Vaidya. On reliable broadcast in a radio network. In 24th Annual ACM Symposium on Principles of Distributed Computing (PODC), pages 138--147, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. V. Bhandari and N. H. Vaidya. On reliable broadcast in a radio network: A simplified characterization. Technical report, CSL, UIUC, May 2005.Google ScholarGoogle Scholar
  16. V. Bhandhari, J. Katz, C.-Y. Koo, and N. Vaidya. Reliable broadcast in radio networks: The bounded collision case. In 25th Annual ACM Symposium on Principles of Distributed Computing (PODC), pages 258 - 264, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. E. Bortnikov, M. Gurevich, I. Keidar, G. Kliot, and A. Shraer. Brahms: Byzantine resilient random membership sampling. Computer Networks, 53(13):2340--2359, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Bracha. An asynchronous {(n - 1)/3}-resilient consensus protocol. In PODC '84: Proceedings of the third annual ACM symposium on Principles of distributed computing, pages 154--162, New York, NY, USA, 1984. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Castro and B. Liskov. Practical Byzantine fault tolerance. Operating Systems Review, 33:173--186, 1998.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. C.-F. Cheng, S.-C. Wang, and T. Liang. The anatomy study of server-initial agreement for general hierarchy wired/wireless networks. Computer Standards & Interfaces, 31(1):219 - 226, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Attested append-only memory: making adversaries stick to their word. ACM SIGOPS Operating Systems Review, 41(6):189--204, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Clement, M. Kapritsos, S. Lee, Y. Wang, L. Alvisi, M. Dahlin, and T. Riché. Upright cluster services. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, pages 277--290. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Clement, M. Marchetti, E. Wong, L. Alvisi, and M. Dahlin. Byzantine fault tolerance: the time is now. In LADIS '08: Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware, pages 1--4, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Clement, E. Wong, L. Alvisi, M. Dahlin, and M. Marchetti. Making Byzantine fault tolerant systems tolerate Byzantine faults. In Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, 2009.Google ScholarGoogle Scholar
  25. J. Cowling, D. Myers, B. Liskov, R. Rodrigues, and L. Shrira. Hq replication: A hybrid quorum protocol for byzantine fault tolerance. In In Proceedings of Operating Systems Design and Implementation (OSDI), San Diego, CA, USA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. Cowling, D. Myers, B. Liskov, R. Rodrigues, and L. Shrira. HQ replication: A hybrid quorum protocol for Byzantine fault tolerance. In Proceedings of the 7th symposium on Operating systems design and implementation, page 190. USENIX Association, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. F. Cristian, H. Aghili, R. Strong, and D. Dolev. Atomic broadcast: From simple message diffusion to Byzantine agreement. Information and Computation, 118(1):158, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. D. Dolev and R. Reischuk. Bounds on information exchange for byzantine agreement. Journal of the ACM, 32(1):191--204, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. V. Drabkin, R. Friedman, and M. Segal. Efficient byzantine broadcast in wireless ad-hoc networks. In International Conference on Dependable Systems and Networks (ICDSN), pages 160--169, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. C. Dwork, D. Peleg, N. Pippenger, and E. Upfal. Fault tolerance in networks of bounded degree. In Proceedings of the eighteenth annual ACM symposium on Theory of computing, page 379. ACM, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Farsite. The Farsite Project. http://research.microsoft.com/farsite.Google ScholarGoogle Scholar
  32. U. Feige. Noncryptographic selection protocols. In FOCS, pages 142--153, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. P. Feldman and S. Micali. Byzantine agreement in constant expected time (and trusting no one). In FOCS, pages 267--276, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. M. Fischer. The consensus problem in unreliable distributed systems (a brief survey). In Fundamentals of Computation Theory, pages 127--140, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Fischer, N. Lynch, and M. Paterson. Impossibility of distributed consensus with one faulty process. Journal of the ACM (JACM), 32(2):374--382, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. I. T. Foster, N. R. Jennings, and C. Kesselman. Brain meets brawn: Why grid and agents need each other. In P. Ritrovato, S. A. Cerri, S. Salerno, M. Gaeta, C. Allison, and T. Dimitrakos, editors, Towards the Learning Grid, volume 127 of Frontiers in Artificial Intelligence and Applications, pages 28--40. IOS Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. N. Fultz and J. Grossklags. Blue versus red: Towards a model of distributed security attacks. In Financial Cryptography, pages 167--183, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. R. Gradwohl, S. P. Vadhan, and D. Zuckerman. Random selection with an adversarial majority. In CRYPTO, pages 409--426, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. M. Humphrey and M. Thompson. Security Implications of Typical Grid Computing Usage Scenarios, 2000. Security Working Group GRIP forum draft.Google ScholarGoogle Scholar
  40. N. R. Josep Diaz, Dieter Mitsche and J. Saia. On the power of mediators. In Proceedings of the Workshop on Internet and Network Economics (WINE), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. B. M. Kapron, D. Kempe, V. King, J. Saia, and V. Sanwalani. Fast asynchronous byzantine agreement and leader election with full information. In SODA, pages 1038--1047, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. M. J. Kearns and L. E. Ortiz. Algorithms for interdependent security games. In Advances in Neural Information Processing Systems (NIPS), 2003.Google ScholarGoogle Scholar
  43. V. King, S. Lonergan, J. Saia, and A. Trehan. Load balanced scalable byzantine agreement through quorum building, with full information. In submitted to ICDCN, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. V. King, C. A. Phillips, J. Saia, and M. Young. Sleeping on the job: energy-efficient and robust broadcast for radio networks. In R. A. Bazzi and B. Patt-Shamir, editors, PODC, pages 243--252. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. V. King and J. Saia. From almost everywhere to everywhere: Byzantine agreement with Üo(n3/2) bits. In DISC, pages 464--478, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. V. King and J. Saia. Breaking the o(n2) bit barrier: Scalable byzantine agreement with an adaptive adversary. In PODC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. V. King, J. Saia, V. Sanwalani, and E. Vee. Scalable leader election. In SODA, pages 990--999, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. V. King, J. Saia, V. Sanwalani, and E. Vee. Towards secure and scalable computation in peer-to-peer networks. In FOCS, pages 87--98, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. G. Kol and M. Naor. Games for exchanging information. In Proceedings of the Symposium on the Theory of Computing, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong. Zyzzyva: speculative byzantine fault tolerance. In Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, page 58. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. E. Koutsoupias and C. Papadimitriou. Worst-case equilibria. In Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. Oceanstore: An architecture for global-scale persistent storage. In Proceedings of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3):401, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. H. Li, A. Clement, E.Wong, J. Napper, I. Roy, L. Alvisi, and M. Dahlin. BAR gossip. In Proceedings of the 7th symposium on Operating systems design and implementation, page 204. USENIX Association, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Y. Mao, F. Junqueira, and K. Marzullo. Towards low latency state machine replication for uncivil wide-area networks. In Workshop on Hot Topics in System Dependability. Citeseer, 2009.Google ScholarGoogle Scholar
  56. Y. Minsky and F. Schneider. Tolerating malicious gossip. Distributed Computing, 16(1):49--68, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. T. Ngan, D.Wallach, and P. Druschel. Enforcing fair sharing of peer-to-peer resources. In International Workshop on Peer-to-Peer Systems (IPTPS), 2003.Google ScholarGoogle ScholarCross RefCross Ref
  58. Nisan, Roughgarden, Tardos, and Vazirani. Algorithmic Game Theory. Cambridge University Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Oceanstore. The Oceanstore Project. http://oceanstore.cs.berkeley.edu.Google ScholarGoogle Scholar
  60. A. Patra and P. Rangan. Brief announcement: Communication efficient asynchronous byzantine agreement. In PODC '10: Proceedings of the 28th ACM symposium on Principles of distributed computing, pages 243--244, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao, and J. Kubiatowicz. Pond: the OceanStore prototype. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies, pages 1--14, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. F. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys (CSUR), 22(4):319, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. E. Shi, A. Perrig, et al. Designing secure sensor networks. IEEE Wireless Communications, 11(6):38- 43, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proceedings of the 2001 ACM SIGCOMM Conference, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. E. Upfal. Tolerating linear number of faults in networks of bounded degree. In Proceedings of the eleventh annual ACM symposium on Principles of distributed computing, pages 83--89. ACM New York, NY, USA, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. V. Vishnumurthy, S. Chandrakumar, and E. Sirer. Karma: A secure economic framework for peer-topeer resource sharing. In Workshop on Economics of Peer-to-Peer Systems, 2003.Google ScholarGoogle Scholar
  67. Wikipedia. Anonymous Peer-to-peer. http://en.wikipedia.org/wiki/AnonymousP2P.Google ScholarGoogle Scholar
  68. J. Yan, S. Early, and R. Anderson. The xenoservice-a distributed defeat for distributed denial of service. Proceedings of Information Survivability Workshop (ISW), 2000.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGACT News
    ACM SIGACT News  Volume 41, Issue 3
    September 2010
    105 pages
    ISSN:0163-5700
    DOI:10.1145/1855118
    Issue’s Table of Contents

    Copyright © 2010 Authors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 3 September 2010

    Check for updates

    Qualifiers

    • column

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader