In a seminal paper, Feldman and Micali (STOC ’88) show an n-party Byzantine agreement protocol tolerating t < n/3 malicious parties that runs in expected constant rounds. Here, we show an expected constant-round protocol for authenticated Byzantine agreement assuming honest majority (i.e., t < n/2), and relying only on the existence of a secure signature scheme and a public-key infrastructure (PKI). Combined with existing results, this gives the first expected constant-round protocol for secure computation with honest majority in a point-to-point network assuming only one-way functions and a PKI. Our key technical tool — a new primitive we introduce called moderated VSS — also yields a simpler proof of the Feldman-Micali result. We al...
This paper proposes a hierarchy of three Byzantine-resistant protocols aimed to be used in practical...
This paper proposes a hierarchy of three Byzantine-resistant protocols aimed to be used in practical...
Under the assumption that each participant can broadcast a message to all other participants and tha...
In a seminal paper, Feldman and Micali have shown an n-party Byzantine agreement protocol tolerating...
AbstractIn a seminal paper, Feldman and Micali show an n-party Byzantine agreement protocol in the p...
In a seminal paper, Feldman and Micali (STOC ’88) show an n-party Byzantine agreement protocol toler...
In a seminal paper, Feldman and Micali (STOC \u2788) show an $n$-party Byzantine agreement protocol ...
Many distributed systems, such as distributed ledger technologies, IoT technologies, and distributed...
Byzantine agreement is a fundamental issue in fault-tolerant and secure distributed computing. Proto...
We prove lower bounds on the round complexity of randomized Byzantine agreement (BA) protocols, boun...
We construct a Byzantine Agreement protocol that tolerates t < n/2 corruptions, is very efficient in...
We present a very simple, cryptographic, binary Byzantine-Agreement protocol that, with n ≥ 3t + 1 ≥...
Abstract. Byzantine Agreement (BA) among n players allows the play-ers to agree on a value, even whe...
We present a very simple, cryptographic, binary Byzantine-Agreement protocol that, with n ≥ 3t + 1 ≥...
The main aim of cryptography is to provide the frameworks and solutions for information security. Th...
This paper proposes a hierarchy of three Byzantine-resistant protocols aimed to be used in practical...
This paper proposes a hierarchy of three Byzantine-resistant protocols aimed to be used in practical...
Under the assumption that each participant can broadcast a message to all other participants and tha...
In a seminal paper, Feldman and Micali have shown an n-party Byzantine agreement protocol tolerating...
AbstractIn a seminal paper, Feldman and Micali show an n-party Byzantine agreement protocol in the p...
In a seminal paper, Feldman and Micali (STOC ’88) show an n-party Byzantine agreement protocol toler...
In a seminal paper, Feldman and Micali (STOC \u2788) show an $n$-party Byzantine agreement protocol ...
Many distributed systems, such as distributed ledger technologies, IoT technologies, and distributed...
Byzantine agreement is a fundamental issue in fault-tolerant and secure distributed computing. Proto...
We prove lower bounds on the round complexity of randomized Byzantine agreement (BA) protocols, boun...
We construct a Byzantine Agreement protocol that tolerates t < n/2 corruptions, is very efficient in...
We present a very simple, cryptographic, binary Byzantine-Agreement protocol that, with n ≥ 3t + 1 ≥...
Abstract. Byzantine Agreement (BA) among n players allows the play-ers to agree on a value, even whe...
We present a very simple, cryptographic, binary Byzantine-Agreement protocol that, with n ≥ 3t + 1 ≥...
The main aim of cryptography is to provide the frameworks and solutions for information security. Th...
This paper proposes a hierarchy of three Byzantine-resistant protocols aimed to be used in practical...
This paper proposes a hierarchy of three Byzantine-resistant protocols aimed to be used in practical...
Under the assumption that each participant can broadcast a message to all other participants and tha...