Implementing Trustworthy Services Using Replicated State Machines

  • Authors:
  • Fred B. Schneider;Lidong Zhou

  • Affiliations:
  • Cornell University;Microsoft Research Silicon Valley

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

A thread of research has emerged to investigate the interactions of replication with threshold cryptography for use in environments that satisfy weak assumptions. The result is a new paradigm known as distributed trust; this article attempts to survey that landscape.