Byzantine fault-tolerant consensus algorithms: A survey
W Zhong, C Yang, W Liang, J Cai, L Chen, J Liao… - Electronics, 2023 - mdpi.com
The emergence of numerous consensus algorithms for distributed systems has resulted from
the swift advancement of blockchain and its related technologies. Consensus algorithms …
the swift advancement of blockchain and its related technologies. Consensus algorithms …
Engraft: Enclave-guarded Raft on Byzantine faulty nodes
This paper presents the first critical analysis of building highly secure, performant, and
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …
confidential Byzantine fault-tolerant (BFT) consensus by integrating off-the-shelf crash fault …
Narrator: Secure and practical state continuity for trusted execution in the cloud
Public cloud platforms have leveraged Trusted Execution Environment (TEE) technology to
provide confidential computing services. However, TEE-protected applications still suffer …
provide confidential computing services. However, TEE-protected applications still suffer …
ubft: Microsecond-scale bft using disaggregated memory
We propose uBFT, the first State Machine Replication (SMR) system to achieve microsecond-
scale latency in data centers, while using only 2 f+ 1 replicas to tolerate f Byzantine failures …
scale latency in data centers, while using only 2 f+ 1 replicas to tolerate f Byzantine failures …
Flare: A fast, secure, and memory-efficient distributed analytics framework
As big data processing in the cloud becomes prevalent today, data privacy on such public
platforms raises critical concerns. Hardware-based trusted execution environments (TEEs) …
platforms raises critical concerns. Hardware-based trusted execution environments (TEEs) …
[PDF][PDF] Rr: A fault model for efficient tee replication
Trusted Execution Environments (TEEs) ensure the confidentiality and integrity of
computations in hardware. Subject to the TEE's threat model, the hardware shields a …
computations in hardware. Subject to the TEE's threat model, the hardware shields a …
Confidential Consortium Framework: Secure multiparty applications with confidentiality, integrity, and high availability
Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential
properties for trustworthy data systems. The rise of cloud computing and the growing …
properties for trustworthy data systems. The rise of cloud computing and the growing …
Authenticable data analytics over encrypted data in the cloud
Statistical analytics on encrypted data requires a fully-homomorphic encryption (FHE)
scheme. However, heavy computation overheads make FHE impractical. In this paper we …
scheme. However, heavy computation overheads make FHE impractical. In this paper we …
MultiTEE: Distributing Trusted Execution Environments
The adoption of wearable technologies, such as smartwatches or wristbands, is rising. End-
users expect to use all of their devices in an interconnected and seamless manner to …
users expect to use all of their devices in an interconnected and seamless manner to …
TEE-based General-purpose Computational Backend for Secure Delegated Data Processing
The increasing prevalence of data breaches necessitates robust data protection measures
in computational tasks. Secure computation outsourcing (SCO) presents a viable solution by …
in computational tasks. Secure computation outsourcing (SCO) presents a viable solution by …