Inicio > > Redes y comunicaciones informáticas > Fault-Tolerant Distributed Consensus in Synchronous Networks
Fault-Tolerant Distributed Consensus in Synchronous Networks

Fault-Tolerant Distributed Consensus in Synchronous Networks

Arpita Patra / Ashish Choudhury

182,75 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2025
Materia
Redes y comunicaciones informáticas
ISBN:
9783031804595
182,75 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Fault-tolerant distributed consensus is a fundamental concept, both in cryptography as well as distributed computing. Ever since the inception of the problem by Lamport et al in 1982, the problem has been widely studied, both in cryptography as well as distributed computing community and several fundamental results have been obtained regarding the possibility, feasibility and optimality of the consensus protocols in various network models and adversarial settings. The problem has generated revived interest from several other communities over the last few years, after the advent of Blockchain protocols. Traditionally, the consensus protocols are studied either in the synchronous or in the asynchronous communication setting and very often the protocols in the former category serve as the basis for the protocols in the latter category. The focus of this book will be on the synchronous communication setting. The book presents all the seminal possibility and feasibility results in this model ever since the inception of the consensus problem, with formal security proofs. Even though the synchronous corruption model may seem weaker than the more practical asynchronous communication model, designing protocols in the synchronous model turns out to be non-trivial and demands sophisticated and highly advanced techniques. Moreover, understanding protocols in the synchronous setting often constitutes the first stepping stone to understanding the more complex asynchronous consensus protocols. The topic of synchronous consensus protocols in itself is a very vast and important topic to be covered in a single book.

Artículos relacionados

  • Next Generation Search Engines
    Recent technological progress in computer science, Web technologies, and the constantly evolving information available on the Internet has drastically changed the landscape of search and access to information. Current search engines employ advanced techniques involving machine learning, social networks, and semantic analysis. Next Generation Search Engines: Advanced Models for ...
  • Collaboration and the Semantic Web
    Collaborative working has been increasingly viewed as a good practice for organizations to achieve efficiency. Organizations that work well in collaboration may have access to new sources of funding, deliver new, improved, and more integrated services, make savings on shared costs, and exchange knowledge, information and expertise. Collaboration and the Semantic Web: Social Net...
  • Resource Allocation in Next-Generation Broadband Wireless Access Networks
    With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research o...
  • Advanced Topics in Information Technology Standards and Standardization Research, Volume 1
    Kai Jakobs
    ...
  • Data Warehouses and OLAP
    ...
  • Selected Readings on Database Technologies and Applications
    Terry Halpin
    Education and research in the field of database technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Database Technologies and Applications supplements course instruction and student research with quality chapters focused on key issues concerning the development, design, and analysis ...

Otros libros del autor

  • Secure Multi-Party Computation Against Passive Adversaries
    Arpita Patra / Ashish Choudhury
    This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of a...
    Disponible

    48,06 €