Fault-Tolerant Distributed Consensus in Synchronous Networks
Fault-tolerant distributed consensus is a fundamental concept, both in cryptography as well as distributed computing. Ever since the inception of the problem by Lamport et al in 1982, the problem has been widely studied, both in cryptography as well as distributed computing community and several fundamental results have been obtained regarding the possibility, feasibility and optimality of the consensus prools in various network models and adversarial settings. The problem has generated revived interest from several other communities over the last few years, after the advent of Blockchain prools. Traditionally, the consensus prools are studied either in the synchronous or in the asynchronous communication setting and very often the prools in the former category serve as the basis for the prools in the latter category. The focus of this book will be on the synchronous communication setting. The book presents all the seminal possibility and feasibility results in this model ever since the inception of the consensus problem, with formal security proofs. Even though the synchronous corruption model may seem weaker than the more practical asynchronous communication model, designing prools in the synchronous model turns out to be non-trivial and demands sophisticated and highly advanced techniques. Moreover, understanding prools in the synchronous setting often constitutes the first stepping stone to understanding the more complex asynchronous consensus prools. The topic of synchronous consensus prools in itself is a very vast and important topic to be covered in a single book.

1146514789
Fault-Tolerant Distributed Consensus in Synchronous Networks
Fault-tolerant distributed consensus is a fundamental concept, both in cryptography as well as distributed computing. Ever since the inception of the problem by Lamport et al in 1982, the problem has been widely studied, both in cryptography as well as distributed computing community and several fundamental results have been obtained regarding the possibility, feasibility and optimality of the consensus prools in various network models and adversarial settings. The problem has generated revived interest from several other communities over the last few years, after the advent of Blockchain prools. Traditionally, the consensus prools are studied either in the synchronous or in the asynchronous communication setting and very often the prools in the former category serve as the basis for the prools in the latter category. The focus of this book will be on the synchronous communication setting. The book presents all the seminal possibility and feasibility results in this model ever since the inception of the consensus problem, with formal security proofs. Even though the synchronous corruption model may seem weaker than the more practical asynchronous communication model, designing prools in the synchronous model turns out to be non-trivial and demands sophisticated and highly advanced techniques. Moreover, understanding prools in the synchronous setting often constitutes the first stepping stone to understanding the more complex asynchronous consensus prools. The topic of synchronous consensus prools in itself is a very vast and important topic to be covered in a single book.

129.99 In Stock
Fault-Tolerant Distributed Consensus in Synchronous Networks

Fault-Tolerant Distributed Consensus in Synchronous Networks

by Ashish Choudhury, Arpita Patra
Fault-Tolerant Distributed Consensus in Synchronous Networks

Fault-Tolerant Distributed Consensus in Synchronous Networks

by Ashish Choudhury, Arpita Patra

Paperback

$129.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Fault-tolerant distributed consensus is a fundamental concept, both in cryptography as well as distributed computing. Ever since the inception of the problem by Lamport et al in 1982, the problem has been widely studied, both in cryptography as well as distributed computing community and several fundamental results have been obtained regarding the possibility, feasibility and optimality of the consensus prools in various network models and adversarial settings. The problem has generated revived interest from several other communities over the last few years, after the advent of Blockchain prools. Traditionally, the consensus prools are studied either in the synchronous or in the asynchronous communication setting and very often the prools in the former category serve as the basis for the prools in the latter category. The focus of this book will be on the synchronous communication setting. The book presents all the seminal possibility and feasibility results in this model ever since the inception of the consensus problem, with formal security proofs. Even though the synchronous corruption model may seem weaker than the more practical asynchronous communication model, designing prools in the synchronous model turns out to be non-trivial and demands sophisticated and highly advanced techniques. Moreover, understanding prools in the synchronous setting often constitutes the first stepping stone to understanding the more complex asynchronous consensus prools. The topic of synchronous consensus prools in itself is a very vast and important topic to be covered in a single book.


Product Details

ISBN-13: 9783031804595
Publisher: Springer Nature Switzerland
Publication date: 03/25/2025
Series: Information Security and Cryptography
Pages: 312
Product dimensions: 6.10(w) x 9.25(h) x (d)

About the Author

Arpita Patra: Arpita Patra is presently an Associate Professor at the Indian Institute of Science. She previously held several industry positions, such as (a) visiting faculty at Silence Laboratories, Singapore, in the summer of 2024 and (b) visiting faculty researcher at Google Research between 2022-2023. Her area of interest is Cryptography, focusing on theoretical and practical aspects of secure multiparty computation prools. She received her PhD from the Indian Institute of Technology (IIT), Madras and held post-doctoral positions at the University of Bristol, UK, ETH Zurich, Switzerland, and Aarhus University, Denmark. Her research has been recognized with the Prof. S. K. Chatterjee Award for Outstanding Woman Researcher or Industry Leader 2023 by IISc (2023), Google Privacy Research Faculty Award 2023, J P Morgan Chase Faculty Award 2022, SONY Faculty Innovation Award 2021, Google Research Award 2020, NASI Young Scientist Platinum Jubilee Award 2018, SERB Women Excellence award 2016, INAE Young Engineer award 2016 and associateships with various scientific bodies such as Indian Academy of Sciences (IAS), Indian National Academy of Engineering (INAE), The World Academy of Sciences (TWAS) and Indian Association for Research in Computing Science (IARCS). She has co-authored a research monogram on Multi-party Computation titled “Secure Multiparty Computation against Passive Adversaries”.

Ashish Choudhury: Ashish Choudhury received his PhD in Computer Science from IIT Madras, India. He held postdoctoral positions at the University of Bristol and the Indian Statistical Institute. Dr. Choudhury received the Infosys Foundation Career Development Chair Professor award and the Visvesvaraya Young Faculty Research Fellow award. He has been selected for the ACM India eminent speaker program. His research interest is in the theoretical aspect of cryptography, with a special focus on designing and analyzing multi-party computation prools. He has offered multiple courses on cryptography and secure multiparty computation on NPTEL, a project funded by the Govt. of India, which offers free online courses in various science and engineering disciplines. He has co-authored a book titled "Secure Multi-Party Computation Against Passive Adversaries".

Table of Contents

Introduction to fault tolerant distributed consensus.- Preliminaries.- EIG prool for reliable broadcast.- Efficient consensus prools.- Domain extension for consensus prools with perfect security.- Lower Bound on the resilience of Byzantine agreement without any set up.- Byzantine broadcast with a trusted PKI set up.- Domain extension for consensus prools with cryptographic and statistical security.- Lower bound for the number of rounds for deterministic consensus prools.- Randomized consensus prools.- Instantiating common-coin and leader election from scratch.- Lower Bound on the Message Complexity of Consensus/Broadcast.

From the B&N Reads Blog

Customer Reviews