{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T06:41:54Z","timestamp":1778654514946,"version":"3.51.4"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T00:00:00Z","timestamp":1646870400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T00:00:00Z","timestamp":1646870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Distrib. Comput."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s00446-022-00421-1","type":"journal-article","created":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T10:02:28Z","timestamp":1646906548000},"page":"477-502","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Asynchronous reconfiguration with Byzantine failures"],"prefix":"10.1007","volume":"35","author":[{"given":"Petr","family":"Kuznetsov","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8764-8760","authenticated-orcid":false,"given":"Andrei","family":"Tonkikh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,3,10]]},"reference":[{"key":"421_CR1","first-page":"84","volume":"102","author":"MK Aguilera","year":"2010","unstructured":"Aguilera, M.K., Keidar, I., Malkhi, D., Martin, J.-P., Shraer, A., et al.: Reconfiguring replicated atomic storage: a tutorial. Bull. EATCS 102, 84\u2013108 (2010)","journal-title":"Bull. EATCS"},{"issue":"2","key":"421_CR2","doi-asserted-by":"publisher","first-page":"7:1","DOI":"10.1145\/1944345.1944348","volume":"58","author":"MK Aguilera","year":"2011","unstructured":"Aguilera, M.K., Keidar, I., Malkhi, D., Shraer, A.: Dynamic atomic storage without consensus. J. ACM 58(2), 7:1-7:32 (2011)","journal-title":"J. ACM"},{"key":"421_CR3","unstructured":"Alchieri, E., Bessani, A., Greve, F., da\u00a0Silva\u00a0Fraga, J: Efficient and modular consensus-free reconfiguration for fault-tolerant storage. In: OPODIS, pp. 26:1\u201326:17 (2017)"},{"key":"421_CR4","doi-asserted-by":"crossref","unstructured":"Alvisi, L., Malkhi, D., Pierce, E., Reiter, M.K., Wright, R.N.: Dynamic byzantine quorum systems. In: Proceeding International Conference on Dependable Systems and Networks. DSN 2000, pp. 283\u2013292. IEEE (2000)","DOI":"10.1109\/ICDSN.2000.857551"},{"key":"421_CR5","doi-asserted-by":"crossref","unstructured":"Aspnes, J., Attiya, H., Censor, K..: Max registers, counters, and monotone circuits. In: PODC, pp. 36\u201345 (2009)","DOI":"10.1145\/1582716.1582728"},{"issue":"1","key":"421_CR6","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1145\/200836.200869","volume":"42","author":"H Attiya","year":"1995","unstructured":"Attiya, H., Bar-Noy, A., Dolev, D.: Sharing memory robustly in message-passing systems. J. ACM (JACM) 42(1), 124\u2013142 (1995)","journal-title":"J. ACM (JACM)"},{"issue":"3","key":"421_CR7","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/TPDS.2018.2867479","volume":"30","author":"H Attiya","year":"2019","unstructured":"Attiya, H., Chung, H.C., Ellen, F., Kumar, S., Welch, J.L.: Emulating a shared register in a system that never stops changing. IEEE Trans. Parallel Distrib. Syst. 30(3), 44\u2013559 (2019)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"421_CR8","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/BF02242714","volume":"8","author":"H Attiya","year":"1995","unstructured":"Attiya, H., Herlihy, M., Rachman, O.: Atomic snapshots using lattice agreement. Distrib. Comput. 8(3), 121\u2013132 (1995)","journal-title":"Distrib. Comput."},{"key":"421_CR9","doi-asserted-by":"crossref","unstructured":"Baldoni, R., Bonomi, S., Kermarrec, A.-M., Raynal, M.: Implementing a register in a dynamic distributed system. In: ICDCS, pp. 639\u2013647 (2009)","DOI":"10.1109\/ICDCS.2009.46"},{"key":"421_CR10","doi-asserted-by":"crossref","unstructured":"Bellare, M., Miner, S.K.: A forward-secure digital signature scheme. In: Annual International Cryptology Conference, pp. 431\u2013448. Springer (1999)","DOI":"10.1007\/3-540-48405-1_28"},{"key":"421_CR11","doi-asserted-by":"crossref","unstructured":"Boyen, X., Shacham, H., Shen, E., Waters, B.: Forward-secure signatures with untrusted update. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 191\u2013200 (2006)","DOI":"10.1145\/1180405.1180430"},{"key":"421_CR12","doi-asserted-by":"crossref","unstructured":"Brewer, E.A.: Towards robust distributed systems (abstract). In: PODC, p. 7 (2000)","DOI":"10.1145\/343477.343502"},{"key":"421_CR13","doi-asserted-by":"crossref","unstructured":"Cachin, C., Guerraoui, R., Rodrigues, L.: Introduction to reliable and secure distributed programming. Springer (2011)","DOI":"10.1007\/978-3-642-15260-3"},{"issue":"3","key":"421_CR14","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s00145-006-0442-5","volume":"20","author":"R Canetti","year":"2007","unstructured":"Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. J. Cryptol. 20(3), 265\u2013294 (2007)","journal-title":"J. Cryptol."},{"key":"421_CR15","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The sybil attack. In: International workshop on peer-to-peer systems, pp. 251\u2013260. Springer (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"421_CR16","unstructured":"Drijvers, M., Gorbunov, S., Neven, G., Wee, H..: Pixel: Multi-signatures for consensus. In: 29th USENIX Security Symposium (USENIX Security 20), August (2020)"},{"key":"421_CR17","doi-asserted-by":"crossref","unstructured":"Faleiro, J., Rajamani, S., Rajan, K., Ramalingam, G., Vaswani, K.: Generalized lattice agreement. In: PODC, pp. 125\u2013134 (2012)","DOI":"10.1145\/2332432.2332458"},{"issue":"2","key":"421_CR18","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/3149.214121","volume":"32","author":"MJ Fischer","year":"1985","unstructured":"Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. J. ACM (JACM) 32(2), 374\u2013382 (1985)","journal-title":"J. ACM (JACM)"},{"key":"421_CR19","doi-asserted-by":"crossref","unstructured":"Gafni, E.: Round-by-round fault detectors: unifying synchrony and asynchrony. In: PODC, pp. 143\u2013152 (1998)","DOI":"10.1145\/277697.277724"},{"key":"421_CR20","doi-asserted-by":"crossref","unstructured":"Gafni, E., Malkhi, D.: Elastic configuration maintenance via a parsimonious speculating snapshot solution. In: DISC, pp. 140\u2013153 (2015)","DOI":"10.1007\/978-3-662-48653-5_10"},{"key":"421_CR21","doi-asserted-by":"crossref","unstructured":"Gifford, D.K.: Weighted voting for replicated data. In: SOSP, pp. 150\u2013162 (1979)","DOI":"10.1145\/800215.806583"},{"key":"421_CR22","doi-asserted-by":"crossref","unstructured":"Gilbert, S., Lynch, N.: Brewer\u2019s conjecture and the feasibility of consistent, available, partition-tolerant web services. SIGACT News 33(2), 51\u201359 (2002)","DOI":"10.1145\/564585.564601"},{"issue":"4","key":"421_CR23","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s00446-010-0117-1","volume":"23","author":"S Gilbert","year":"2010","unstructured":"Gilbert, S., Lynch, N.A., Shvartsman, A.A.: Rambo a robust, reconfigurable atomic memory service for dynamic networks. Distrib. Comput. 23(4), 225\u2013272 (2010)","journal-title":"Distrib. Comput."},{"key":"421_CR24","doi-asserted-by":"crossref","unstructured":"Jehl, L., Vitenberg, R., Meling, H.: Smartmerge: a new approach to reconfiguration for atomic storage. In: DISC, pp. 154\u2013169 (2015)","DOI":"10.1007\/978-3-662-48653-5_11"},{"key":"421_CR25","doi-asserted-by":"crossref","unstructured":"Kermarrec, A.-M., Van Steen, M.: Gossiping in distributed systems. ACM SIGOPS Oper. Syst. Rev. 41(5), 2\u20137 (2007)","DOI":"10.1145\/1317379.1317381"},{"key":"421_CR26","unstructured":"Kumar, S., Welch, J.L.: Byzantine-tolerant register in a system with continuous churn. Preprint arXiv:1910.06716 (2019)"},{"key":"421_CR27","unstructured":"Kuznetsov, P., Rieutord, T., Tucci-Piergiovanni, S.: Reconfigurable lattice agreement and applications. In: OPODIS (2019)"},{"key":"421_CR28","unstructured":"Kuznetsov, P., Tonkikh, A..: Asynchronous reconfiguration with byzantine failures. In: 34th International Symposium on Distributed Computing, DISC 2020, October 12\u201316, 2020, Virtual Conference, vol. 179 of LIPIcs, pp. 27:1\u201327:17 (2020)"},{"issue":"1","key":"421_CR29","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1753171.1753191","volume":"41","author":"L Lamport","year":"2010","unstructured":"Lamport, L., Malkhi, D., Zhou, L.: Reconfiguring a state machine. SIGACT News 41(1), 63\u201373 (2010)","journal-title":"SIGACT News"},{"issue":"4","key":"421_CR30","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s004460050050","volume":"11","author":"D Malkhi","year":"1998","unstructured":"Malkhi, D., Reiter, M.: Byzantine quorum systems. Distrib. Comput. 11(4), 203\u2013213 (1998)","journal-title":"Distrib. Comput."},{"key":"421_CR31","doi-asserted-by":"crossref","unstructured":"Malkin, T., Micciancio, D., Miner, S.: Efficient generic forward-secure signatures with an unbounded number of time periods. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 400\u2013417. Springer (2002)","DOI":"10.1007\/3-540-46035-7_27"},{"key":"421_CR32","doi-asserted-by":"crossref","unstructured":"Martin, J.-P., Alvisi, L.: A framework for dynamic byzantine storage. In: International Conference on Dependable Systems and Networks, 2004, pp. 325\u2013334. IEEE (2004)","DOI":"10.1109\/DSN.2004.1311902"},{"key":"421_CR33","doi-asserted-by":"crossref","unstructured":"Shapiro, M., Pregui\u00e7a, N.M., Baquero, C., Zawirski, M.: Conflict-free replicated data types. In: SSS, pp. 386\u2013400 (2011)","DOI":"10.1007\/978-3-642-24550-3_29"},{"key":"421_CR34","doi-asserted-by":"crossref","unstructured":"Spiegelman, A., Keidar, I.: On liveness of dynamic storage. In: Structural Information and Communication Complexity\u201424th International Colloquium, SIROCCO 2017, Porquerolles, France, June 19\u201322, 2017, Revised Selected Papers, pp. 356\u2013376 (2017)","DOI":"10.1007\/978-3-319-72050-0_21"},{"key":"421_CR35","unstructured":"Spiegelman, A., Keidar, I., Malkhi, D.: Dynamic reconfiguration: abstraction and optimal asynchronous solution. In: DISC, pp. 40:1\u201340:15 (2017)"},{"key":"421_CR36","unstructured":"Zheng, X., Hu, C., Garg, V.K.: Lattice agreement in message passing systems. In: DISC, pp. 41:1\u201341:17 (2018)"}],"container-title":["Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-022-00421-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00446-022-00421-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-022-00421-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T01:06:29Z","timestamp":1726794389000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00446-022-00421-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,10]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["421"],"URL":"https:\/\/doi.org\/10.1007\/s00446-022-00421-1","relation":{},"ISSN":["0178-2770","1432-0452"],"issn-type":[{"value":"0178-2770","type":"print"},{"value":"1432-0452","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,10]]},"assertion":[{"value":"23 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}