{"title":"拜占庭协议问题:最优提前停止","authors":"A. Krings, Thomas Feyer","doi":"10.1109/HICSS.1999.772983","DOIUrl":null,"url":null,"abstract":"Addresses solutions to the problem of reaching agreement in the presence of faults. Whereas the need for agreement has surfaced mainly in fault-tolerant real-time applications, agreement can be a useful mechanism in network security to mask intrusions. However, due to the communication overhead involved and the fact that the system is expected to operate without problems most of the time, early stopping algorithms are of special interest. We introduce a non-authenticated early stopping algorithm that is optimal in terms of rounds and the number of processors in the system. The basic idea of the algorithm as closely related to the work of P. Berman et al. (1992). However, our algorithm is easier to implement because of its algorithmic definition. It is directly derived from the algorithm by L. Lamport et al. (1982) and is based on two simple functions only. We are convinced that the construction of the early stopping algorithm presented in this paper increases understanding and clarifies the underlying problems of early stopping.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"975 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":"{\"title\":\"The Byzantine agreement problem: optimal early stopping\",\"authors\":\"A. Krings, Thomas Feyer\",\"doi\":\"10.1109/HICSS.1999.772983\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Addresses solutions to the problem of reaching agreement in the presence of faults. Whereas the need for agreement has surfaced mainly in fault-tolerant real-time applications, agreement can be a useful mechanism in network security to mask intrusions. However, due to the communication overhead involved and the fact that the system is expected to operate without problems most of the time, early stopping algorithms are of special interest. We introduce a non-authenticated early stopping algorithm that is optimal in terms of rounds and the number of processors in the system. The basic idea of the algorithm as closely related to the work of P. Berman et al. (1992). However, our algorithm is easier to implement because of its algorithmic definition. It is directly derived from the algorithm by L. Lamport et al. (1982) and is based on two simple functions only. We are convinced that the construction of the early stopping algorithm presented in this paper increases understanding and clarifies the underlying problems of early stopping.\",\"PeriodicalId\":116821,\"journal\":{\"name\":\"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers\",\"volume\":\"975 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1999-01-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"24\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HICSS.1999.772983\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HICSS.1999.772983","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Byzantine agreement problem: optimal early stopping
Addresses solutions to the problem of reaching agreement in the presence of faults. Whereas the need for agreement has surfaced mainly in fault-tolerant real-time applications, agreement can be a useful mechanism in network security to mask intrusions. However, due to the communication overhead involved and the fact that the system is expected to operate without problems most of the time, early stopping algorithms are of special interest. We introduce a non-authenticated early stopping algorithm that is optimal in terms of rounds and the number of processors in the system. The basic idea of the algorithm as closely related to the work of P. Berman et al. (1992). However, our algorithm is easier to implement because of its algorithmic definition. It is directly derived from the algorithm by L. Lamport et al. (1982) and is based on two simple functions only. We are convinced that the construction of the early stopping algorithm presented in this paper increases understanding and clarifies the underlying problems of early stopping.