{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:15:41Z","timestamp":1725498941792},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540774433"},{"type":"electronic","value":"9783540774440"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77444-0_7","type":"book-chapter","created":{"date-parts":[[2007,12,19]],"date-time":"2007-12-19T08:57:09Z","timestamp":1198054629000},"page":"86-98","source":"Crossref","is-referenced-by-count":0,"title":["On Optimal Probabilistic Asynchronous Byzantine Agreement"],"prefix":"10.1007","author":[{"given":"Amjed","family":"Shareef","sequence":"first","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Ben-Or, C.M.: Another Advantage of Free Choice: Completely Asynchronous Agreement Protocols. In: PODC 1983. Proc. Second ACM Symp. Principles of Distributed Computing, pp. 27\u201330 (1983)","DOI":"10.1145\/800221.806707"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Berman, P., Garay, J.A.: Randomized distributed agreement revisited. In: 23th International Symposium on Fault-Tolerant Computing (FTCS-23), pp. 412\u2013413 (1993)","DOI":"10.1109\/FTCS.1993.627344"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Bracha, G.: An asynchronous [(n\u2009\u2212\u20091)\/3]-resilient consensus protocol. In: PODC. Proc. 3rd ACM Symposium on Principles of Distributed Computing, pp. 154\u2013162 (1984)","DOI":"10.1145\/800222.806743"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/3-540-44647-8_31","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"C. Cachin","year":"2001","unstructured":"Cachin, C., Kursawe, K., Petzold, F., Shoup, V.: Secure and efficient asynchronous broadcast protocols (extended abstract). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 524\u2013541. Springer, Heidelberg (2001)"},{"issue":"3","key":"7_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00145-005-0318-0","volume":"18","author":"C. Cachin","year":"2005","unstructured":"Cachin, C., Kursawe, K., Shoup, V.: Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. Journal of Cryptology\u00a018(3), 219\u2013246 (2005)","journal-title":"Journal of Cryptology"},{"issue":"4","key":"7_CR6","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"L. Carter","year":"1979","unstructured":"Carter, L., Wegman, M.N.: Universal classes of hash functions. Journal of Computing and system sciences (JCSS)\u00a018(4), 143\u2013154 (1979) (Preliminary version appeared in STOC 1977)","journal-title":"Journal of Computing and system sciences (JCSS)"},{"issue":"2","key":"7_CR7","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1145\/226643.226647","volume":"43","author":"T.D. Chandra","year":"1996","unstructured":"Chandra, T.D., Toueg, S.: Unreliable Failure Detectors for Reliable Distributed Systems. J. ACM\u00a043(2), 225\u2013267 (1996)","journal-title":"J. ACM"},{"key":"7_CR8","first-page":"351","volume-title":"ISC 2007. Proceedings of 10th International Conference","author":"Y. Desmedt","year":"2007","unstructured":"Desmedt, Y., Kurosawa, K.: A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. In: ISC 2007. Proceedings of 10th International Conference, vol.\u00a04779, pp. 351\u2013361. Springer, Heidelberg (2007)"},{"issue":"2","key":"7_CR9","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/3149.214121","volume":"32","author":"C.M.J. Fischer","year":"1985","unstructured":"Fischer, C.M.J., Lynch, N., Paterson, M.S.: Impossibility of Distributed Consensus with One Faulty Process. J. ACM\u00a032(2), 374\u2013382 (1985)","journal-title":"J. ACM"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Fitzi, M., Hirt, M.: Optimally efficient multi-valued byzantine agreement. In: PODC 2006. Proceedings of the 25th annual ACM symposium on Principles of distributed computing, Denver, Colorado, USA (July 23 - 26, 2006)","DOI":"10.1145\/1146381.1146407"},{"issue":"2","key":"7_CR11","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M. Pease","year":"1980","unstructured":"Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM\u00a027(2), 228\u2013234 (1980)","journal-title":"Journal of the ACM"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Rabin, C.M.: Randomized Byzantine Generals. In: FOCS 1983. Proc. 24th IEEE Symp. Foundations of Computer Science, pp. 403\u2013409 (1983)","DOI":"10.1109\/SFCS.1983.48"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11795490_9","volume-title":"Principles of Distributed Systems","author":"C.H.V. Ramasamy","year":"2006","unstructured":"Ramasamy, C.H.V., Cachin, C.: Parsimonious asynchronous Byzantine-fault-tolerant atomic broadcast. In: Anderson, J.H., Prencipe, G., Wattenhofer, R. (eds.) OPODIS 2005. LNCS, vol.\u00a03974, Springer, Heidelberg (2006)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-45539-6_15","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Shoup","year":"2000","unstructured":"Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 207\u2013220. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77444-0_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:12:43Z","timestamp":1619521963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77444-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540774433","9783540774440"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77444-0_7","relation":{},"subject":[]}}