Implementing trustworthy services using replicated state machines

  • Authors:
  • Fred B. Schneider;Lidong Zhou

  • Affiliations:
  • Cornell University;Microsoft Research Asia, China

  • Venue:
  • Replication
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

A thread of research has emerged to investigate the interactions of replication with threshold cryptography for use in environments that satisfy weak assumptions. The result is a new paradigm known as distributed trust, and this chapter attempts to survey that landscape.