Abstract
A thread of research has emerged to investigate the interactions of replication with threshold cryptography for use in environments that satisfy weak assumptions. The result is a new paradigm known as distributed trust, and this chapter attempts to survey that landscape.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barak, B., Herzberg, A., Naor, D., Shai, E.: The proactive security toolkit and applications. In: Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS’99), November 1999, pp. 18–27. ACM SIGSAC (1999)
Blakley, G.: Safeguarding cryptographic keys. In: Merwin, R., Zanca, J., Smith, M. (eds.) Proceedings of the 1979 National Computer Conference. AFIPS Conference Proceedings, vol. 48, pp. 313–317. AFIPS Press, New York (1979)
Boyd, C.: Digital multisignatures. In: Baker, H., Piper, F. (eds.) Cryptography and Coding, pp. 241–246. Clarendon Press, Oxford (1989)
Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, November 2002, pp. 88–97. ACM Press, New York (2002)
Cachin, C., Kursawe, K., Shoup, V.: Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. In: Proceedings of the 19th ACM Symposium on Principles of Distributed Computing (PODC 2000), July 2000, pp. 123–132. ACM Press, New York (2000)
Cachin, C., Poritz, J.A.: Secure intrusion-tolerant replication on the Internet. In: Proceedings of the International Conference on Dependable Systems and Networks (DSN-2002), June 2002, pp. 167–176. IEEE Computer Society Press, Los Alamitos (2002)
Canetti, R., Herzberg, A.: Maintaining security in the presence of transient faults. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 425–438. Springer, Heidelberg (1994)
Castro, M., Liskov, B.: Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems 20(4), 398–461 (2002)
Chockler, G., Malkhi, D., Reiter, M.K.: Backoff protocols for distributed mutual exclusion and ordering. In: Proceedings of the International Conference on Distributed Systems, pp. 11–20. IEEE Computer Society Press, Los Alamitos (2001)
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. Journal of the ACM 32(2), 374–382 (1985)
Forrest, S., Somayaji, A., Ackley, D.: Building diverse computer systems. In: Proceedings of the Sixth Workshop on Hot Topics in Operating Systems, Cape Cod, MA, May 1997, pp. 67–72. IEEE Computer Society Press, Los Alamitos (1997)
Garay, J.A., Gennaro, R., Jutla, C., Rabin, T.: Secure distributed storage and retrieval. Theoretical Computer Science 243(1–2), 363–389 (2000)
Goldreich, O., Micali, S., Wigderson, A.: How to play ANY mental game. In: Proceedings of the 19th Annual Conference on Theory of Computing, STOC’87, May 25–27, 1987, pp. 218–229. ACM Press, New York (1987)
Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)
Hirt, M., Maurer, U.: Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology 13(1), 31–60 (2000)
Jakobsson, M.: On quorum controlled asymmetric proxy re-encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 112–121. Springer, Heidelberg (1999)
Knight, J., Leveson, N.G.: An experimental evaluation of the assumption of independence in multi-version programming. IEEE Transactions on Software Engineering 12(1), 96–109 (1986)
Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Communications of the ACM 21(7), 558–565 (1978)
Lamport, L.: The part-time parliament. ACM Transactions on Computer Systems 16(2), 133–169 (1998)
Liskov, B., Ladin, R.: Highly available distributed services and fault-tolerant distributed garbage collection. In: Proceedings of the Fifth Annual ACM Symposium on Principles of Distributed Computing, Calgary, Alberta, Canada, August 1986, pp. 29–39. ACM Press, New York (1986)
Malkhi, D., Reiter, M.: Byzantine quorum system. Distributed Computing 11(4), 203–213 (1998)
Malkhi, D., Reiter, M.: Secure and scalable replication in Phalanx. In: Proceedings of the 17th Symposium on Reliable Distributed Systems, West Lafayette, IN, USA, October 20–22, 1998, pp. 51–58. IEEE Computer Society Press, Los Alamitos (1998)
Marsh, M.A., Schneider, F.B.: CODEX: A robust and secure secret distribution system. IEEE Transactions on Dependable and Secure Computing 1(1), 34–47 (2003)
Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks. In: Proceedings of the 10th Annual Symposium on Principles of Distributed Computing (PODC’91), Montreal, Quebec, Canada, August 19–21, 1991, pp. 51–59. ACM, New York (1991)
Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM 27(2), 228–234 (1980)
Reiter, M.K.: Distributing trust with the Rampart toolkit. Communications of the ACM 39(4), 71–74 (1996)
Rodrigues, R., Castro, M., Liskov, B.: BASE: using abstraction to improve fault tolerance. In: Proceedings of the 18th ACM Symposium on Operating System Principles, Banff, Canada, October 2001, pp. 15–28. ACM, New York (2001)
Schneider, F.B.: Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Computing Surveys 22(4), 299–319 (1990)
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)
Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium Security and Privacy, Oakland, CA USA, May 2000, pp. 44–45. IEEE Computer Society Press, Los Alamitos (2000)
Wu, T., Malkin, M., Boneh, D.: Building intrusion tolerant applications. In: Proceedings of the 8th USENIX Security Symposium, Washington, D.C. USA, August 22–26, 1999, pp. 79–91. USENIX Association (1999)
Wylie, J.J., Bigrigg, M.W., Strunk, J.D., Ganger, G.R., Kiliççöte, H., Khosla, P.K.: Survivable information storage systems. IEEE Computer 33(8), 61–68 (2000)
Xu, J., Kalbarczyk, Z., Iyer, R.K.: Transparent runtime randomization for security. Tech. Rep. UILU-ENG-03-2207 (CRHC-03-03), Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, Urbana-Champaign, IL (May 2003)
Zhou, L., Marsh, M.A., Schneider, F.B., Redz, A.: Distributed blinding for distributed ElGamal re-encryption. In: Proceedings of the 25th International Conference on Distributed Computing Systems, Columbus, Ohio, USA, June 2005, pp. 814–824. IEEE Computer Society, Los Alamitos (2005)
Zhou, L., Schneider, F.B., van Renesse, R.: COCA: A secure distributed on-line certification authority. ACM Transactions on Computer Systems 20(4), 329–368 (2002)
Zhou, L., Schneider, F.B., van Renesse, R.: APSS: Proactive secret sharing in asynchronous systems. ACM Trans. on Information and Sytem Security 8(3) (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schneider, F.B., Zhou, L. (2005). Implementing Trustworthy Services Using Replicated State Machines. In: Charron-Bost, B., Pedone, F., Schiper, A. (eds) Replication. Lecture Notes in Computer Science, vol 5959. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11294-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-11294-2_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11293-5
Online ISBN: 978-3-642-11294-2
eBook Packages: Computer ScienceComputer Science (R0)