Filters








368 Hits in 4.5 sec

Brief Announcement: Towards Byzantine Broadcast in Generalized Communication and Adversarial Models

Chen-Da Liu-Zhang, Varun Maram, Ueli Maurer, Michael Wagner
2019 International Symposium on Distributed Computing  
There are two generalizations suggested for the broadcast problem -w.r.t. the adversarial model and the communication model.  ...  show that in this enhanced model of communication, secure broadcast tolerating up to t corrupted parties is possible if and only if t < b−1 b+1 n.  ...  Generalized Communication and Adversarial Models Models Notation.  ... 
doi:10.4230/lipics.disc.2019.47 dblp:conf/wdag/ZhangMM19 fatcat:q2embvfx6ja3xg5cnfwbpja4na

Brief Announcement: Towards Byzantine Broadcast in Generalized Communication and Adversarial Models

Chen-Da Liu Zhang, Varun Maram, Ueli Maurer, Jukka Suomela
2019
There are two generalizations suggested for the broadcast problem -w.r.t. the adversarial model and the communication model.  ...  show that in this enhanced model of communication, secure broadcast tolerating up to t corrupted parties is possible if and only if t < b−1 b+1 n.  ...  Generalized Communication and Adversarial Models Models Notation.  ... 
doi:10.3929/ethz-b-000377527 fatcat:k7fxvotufrbfpjwqy4xmwxxiti

Brief Announcement: Ordered Reliable Broadcast and Fast Ordered Byzantine Consensus for Cryptocurrency

Pouriya Zarbafian, Vincent Gramoli, Seth Gilbert
2021
They proposed a generic distributed protocol that first orders commands and then runs a leader-based consensus protocol to agree on these orders, hence requiring at least 11 message delays.  ...  The problem of transaction reordering in blockchains, also known as the blockchain anomaly [Christopher Natoli and Vincent Gramoli, 2016], can lead to fairness limitations [Kelkar et al., 2020] and front-running  ...  To collect timestamps from 2f + 1 distinct processes, we modify the reliable broadcast protocol [2] in the asynchronous communication model to obtain a variant that preserves ordering linearizability  ... 
doi:10.4230/lipics.disc.2021.63 fatcat:33fyenam4zaibbdbrp5yzg3w5u

SightSteeple: Agreeing to Disagree with Functional Blockchain Consensus [article]

Aditya Ahuja
2022 arXiv   pre-print
We motivate two adversary models, one with a standard crash-fault adversary and another with a novel rational-fault adversary, to compromise functional blockchain consensus.  ...  We then present two versions of a blockchain protocol called SightSteeple, that achieves functional blockchain consensus in the said fault models.  ...  We so believe that through this contribution, and through the possible future directions as stated above, SightSteeple would be a stepping stone towards defining new consensus paradigms and protocols for  ... 
arXiv:2205.00672v1 fatcat:d2t467b5kzavvgxsxgrzxbi67y

SoK: Understanding BFT Consensus in the Age of Blockchains [article]

Gang Wang
2021 IACR Cryptology ePrint Archive  
We explore both general principles and practical schemes to achieve consensus under Byzantine settings.  ...  At the core of Dumbo-MVBA is an asynchronous provable dispersal broadcast (APDB) in which each input can be split and dispersed to every party and later recovered in an efficient way.  ...  Fig. 8 shows a transaction state diagram in PnyxDB. 5) Other Leaderless Consensuses: Leaderless Byzantine Paxos is a brief announcement proposed by Lamport in 2011 [95] .  ... 
dblp:journals/iacr/Wang21c fatcat:wggbkbi25fg43fieebp4qzlk3m

Distributed Computing Column 60

Jennifer L. Welch
2015 ACM SIGACT News  
The community also discussed about PODC reviewing model and the format of brief announcements.  ...  Then he reviewed the theory and practice for communication with quantum channels, its implications for the Byzantine generals, and described some intriguing open problems.  ... 
doi:10.1145/2852040.2852055 fatcat:hlayo67wurfjhexvgbejt4cwdm

Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks

Michael Sirivianos, Dirk Westhoff, Frederik Armknecht, Joao Girao
2007 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops  
We conclude that these requirements can be satisfied by a distributed random number generator function in which no node is able to determine the output of the function.  ...  Despite this fact, existing aggregator node election schemes do not address an adversary that strives to influence the election process towards candidate nodes that it controls.  ...  Both LEACH and HEED allow an adversarial node to announce itself a cluster head and affect the clustering decisions of honest nodes, thus they are not suitable for our threat model.  ... 
doi:10.1109/wiopt.2007.4480031 dblp:conf/wiopt/SirivianosWAG07 fatcat:ymzgtrudkrgmbptlyxxhsfb6ny

Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security

Esther Palomar, Juan M.E. Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
2007 18th International Conference on Database and Expert Systems Applications (DEXA 2007)  
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulated a general trend towards  ...  So far, research in this domain has led to some middleware models working over Mobile Ad Hoc Networks (MANETs), which are now viewed as a Mobile-P2P (M-P2P) networks.  ...  Consequently, there has been a trend in the research community towards the use of trust models to address some security concerns, particularly for ad hoc and self-organized environments.  ... 
doi:10.1109/dexa.2007.103 dblp:conf/dexaw/PalomarECR07 fatcat:uhdsqm2opjdypbh2gmggns53zu

Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security

Esther Palomar, Juan M.E. Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
2007 Database and Expert Systems Applications  
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulated a general trend towards  ...  So far, research in this domain has led to some middleware models working over Mobile Ad Hoc Networks (MANETs), which are now viewed as a Mobile-P2P (M-P2P) networks.  ...  Consequently, there has been a trend in the research community towards the use of trust models to address some security concerns, particularly for ad hoc and self-organized environments.  ... 
doi:10.1109/dexa.2007.4313000 fatcat:g3hmllgfpvea7fp2hgf7lta6au

A p/2 Adversary Power Resistant Blockchain Sharding Approach [article]

Yibin Xu, Jianhua Shao, Yangyu Huang, Tijs Slaats, Boris Düdder
2021 arXiv   pre-print
First, in a non-sharding blockchain, nodes can have different weight (power or stake) to create a consensus, and as such an adversary needs to control half of the overall weight in order to manipulate  ...  Our experiments show that our new approach outperforms existing blockchain sharding approaches in terms of security, transaction throughput and flexibility.  ...  happening [18] ; (3) causes less loss in transaction throughput than [19] when recovering from halting; and (4) lifts an n/2 Byzantine node resistant blockchain into a p/2 Adversary (Byzantine) power  ... 
arXiv:2004.04798v6 fatcat:sy3n7vdd7zblhnupawa4prwzpm

Network Coding Security: Attacks and Countermeasures [article]

Luísa Lima, João P. Vilela, Paulo F. Oliveira, João Barros
2008 arXiv   pre-print
Throughout the paper we identify a number of research challenges deemed relevant towards the applicability of secure network coding in practical networks.  ...  Furthermore, we give practical examples where network coding can be combined with classical cryptography both for secure communication and secret key distribution.  ...  Part of this work was carried out with assistance of financial support from the European Community under grant FP7-INFSO- ICT-215252 (N-Crave Project  ... 
arXiv:0809.1366v1 fatcat:ghicof62gfegblcn6h2ljwh3ta

Approaching decentralized non-repudiation

H. Kamdem Fezeu, T. Djotio, R. Oulad Haj Thami
2018 EAI Endorsed Transactions on Ubiquitous Environments  
However, these third-parties play an important role in securing brokered communications and are essential in providing Authentication and Non-Repudiation according to current models, and cannot be used  ...  Meanwhile, emerging technologies such as IoT are set to broadcast growing amounts of sensitive data, thereby making centralized architectures problematic for privacy and performance reasons and making  ...  This work was partially supported by the ERMIT Project and conducted at ENSIAS -Mohammed V University, Rabat, Morocco.  ... 
doi:10.4108/eai.12-1-2018.153559 fatcat:t7wnygucabc7lhiljrlynvspmm

Distributed computing column 48

Idit Keidar
2012 ACM SIGACT News  
Acknowledgements We are grateful to the speakers, to the program committee members of WTTM 2012 for their help in reviewing this year's submissions and to Panagiota Fatourou for her help in the organization  ...  We would like to thank Srivatsan Ravi and Mykhailo Laremko for sharing their notes on the talks of the workshop.  ...  David Peleg gave the first talk of the conference with his keynote "Towards an Algorithmically Usable SINR Model for Wireless Communication".  ... 
doi:10.1145/2421119.2421137 fatcat:qivpih26l5fp3ejfmium3bhfdu

Distributed computing column 44 2011 in review

Idit Keidar
2011 ACM SIGACT News  
Call for contributions: I welcome suggestions for material to include in this column, including news, reviews, open problems, tutorials and surveys, either exposing the community to new and interesting  ...  The implication of this equivalence is that algorithms designed in the more abstract shared memory model can be directly be implemented in message passing systems.  ...  129 regular submissions, and 34 additional brief announcement submissions.  ... 
doi:10.1145/2078162.2078178 fatcat:wqzckoz7jngxbpp4ezv6uce65u

A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks [article]

Tejasvi Alladi, Vinay Chamola, Nishad Sahu, Vishnu Venkatesh, Adit Goyal, Mohsen Guizani
2022 arXiv   pre-print
Lastly, we summarize the survey by listing out some common challenges and the future research directions in this field.  ...  The blockchain perspective focuses on blockchain platforms, blockchain types, and consensus mechanisms used in blockchain implementation.  ...  In the second stage, standby miners are incentivized to participate in block verification. 4) Byzantine Fault Tolerance (BFT): Byzantine Fault Tolerance is simply resistance to the Byzantine Generals Problem  ... 
arXiv:2201.04803v1 fatcat:yhm4umjt45ho5fu7mbeu7g66sq
« Previous Showing results 1 — 15 out of 368 results