The economic limits of permissionless consensus
E Budish, A Lewis-Pye, T Roughgarden - Proceedings of the 25th ACM …, 2024 - dl.acm.org
An ideal permissionless consensus protocol would, in addition to satisfying standard
consistency and liveness guarantees, render consistency violations prohibitively expensive …
consistency and liveness guarantees, render consistency violations prohibitively expensive …
On the validity of consensus
The Byzantine consensus problem involves n processes, out of which t< n could be faulty
and behave arbitrarily. Three properties characterize consensus:(1) termination, requiring …
and behave arbitrarily. Three properties characterize consensus:(1) termination, requiring …
[HTML][HTML] As easy as ABC: Optimal (A) ccountable (B) yzantine (C) onsensus is easy!
In a non-synchronous system with n processes, no t 0-resilient (deterministic or probabilistic)
Byzantine consensus protocol can prevent a disagreement among correct processes if the …
Byzantine consensus protocol can prevent a disagreement among correct processes if the …
On active attack detection in messaging with immediate decryption
The widely used Signal protocol provides protection against state exposure attacks through
forward security (protecting past messages) and post-compromise security (for restoring …
forward security (protecting past messages) and post-compromise security (for restoring …
[图书][B] Blockchain scalability and its foundations in distributed systems
V Gramoli - 2022 - Springer
This book is primarily dedicated to (i) engineers who want to refine their distributed
computing expertise and take informed design decisions that can impact the security and …
computing expertise and take informed design decisions that can impact the security and …
Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement
It is well known that a trusted setup allows one to solve the Byzantine agreement problem in
the presence of $ t< n/2$ corruptions, bypassing the setup-free $ t< n/3$ barrier. Alas, the …
the presence of $ t< n/2$ corruptions, bypassing the setup-free $ t< n/3$ barrier. Alas, the …
Asynchronous Wait-Free Runtime Verification and Enforcement of Linearizability
A Castañeda, GV Rodríguez - Proceedings of the 2023 ACM Symposium …, 2023 - dl.acm.org
This paper studies the problem of verifying linearizability at runtime, where one seeks for a
concurrent algorithm for verifying that the current execution of a given concurrent shared …
concurrent algorithm for verifying that the current execution of a given concurrent shared …
Rorqual: Speeding up Narwhal with TEEs
In this paper, we introduce Rorqual, a protocol designed to enhance the performance of the
Narwhal Mempool by integrating Trusted Execution Environments (TEEs). Both Narwhal and …
Narwhal Mempool by integrating Trusted Execution Environments (TEEs). Both Narwhal and …
The Synchronization Power of Auditable Registers
Auditability allows to track all the read operations performed on a register. It abstracts the
need of data owners to control access to their data, tracking who read which information …
need of data owners to control access to their data, tracking who read which information …
Reputation-based state machine replication
M Huang, R Han, Z Du, Y Fu… - 2022 IEEE 21st …, 2022 - ieeexplore.ieee.org
State machine replication (SMR) allows nodes to jointly maintain a consistent ledger, even
when a part of nodes are Byzantine. To defend against and/or limit the impact of attacks …
when a part of nodes are Byzantine. To defend against and/or limit the impact of attacks …