The Byzantine Generals Problem
@article{Lamport1982TheBG,
title={The Byzantine Generals Problem},
author={Leslie Lamport and Robert E. Shostak and Marshall C. Pease},
journal={ACM Trans. Program. Lang. Syst.},
year={1982},
volume={4},
pages={382-401}
}Reliable computer systems must handle malfunctioning components that give conflicting information to different parts of the system. This situation can be expressed abstractly in terms of a group of generals of the Byzantine army camped with their troops around an enemy city. Communicating only by messenger, the generals must agree upon a common battle plan. However, one or more of them may be traitors who will try to confuse the others. The problem is to find an algorithm to ensure that the…
6,490 Citations
The Weak Byzantine Generals Problem
- 1983
Computer Science
JACM
It is shown that, like the original Byzantine Generals Problem, the weak version can be solved only ff fewer than one-third of the processes may fad and an approximate solution exists that can tolerate arbaranly many failures.
Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks
- 2013
History, Mathematics
IEEE Signal Processing Magazine
The Byzantine generals problem is examined in the context of distributed inference, where data collected from remote locations are sent to a fusion center (FC) for processing and inference and the assumption is that the data are potentially tampered or falsified by some internal adversary who has the knowledge about the algorithm used at the FC.
Byzantine Fault Tolerance
- 2010
Computer Science
From Traditional Fault Tolerance to Blockchain
This research focuses on the development of end-to-end techniques for building reliable systems that are general, practical, and theoretically sound.
The real Byzantine Generals
- 2004
Mathematics
The 23rd Digital Avionics Systems Conference (IEEE Cat. No.04CH37576)
In contrast to previous papers on the Byzantine Generals problem, this work examines the problem from a practical, lower-level, phenomena point of view. The goal is to dispel a common belief that the…
The error-resistant interactively consistent architecture (ERICA)
- 1990
Computer Science
[1990] Digest of Papers. Fault-Tolerant Computing: 20th International Symposium
From the evaluation of modularly redundant systems it is concluded that the (4, 2)-concept computer system compares favorably with a triple modular redundant and doubled system, with respect to cost, as well as to reliability.
A S TUDY ON THE I NACCESSIBILITY C HARACTERISTICS OF THE C ONTROLLER A REA N ETWORK
- 1995
Computer Science
This paper does an exhaustive study of CAN inaccessibility characteristics, presenting figures for intervals in CAN operation when the network does not provide service, although not being failed.
COMP 9243 — Week 1 ( 17 s 1 )
- 2017
Computer Science
This course will investigate the various technical challenges that ultimately are the cause for the current lack of “true” distributed systems and study several systems that provide services that are implemented across a collection of computers, but appear as a single service to the user.
COMP 9243 — Week 4 ( 10 s 1 )
- 1985
Computer Science
This course will investigate the various technical challenges that ultimately are the cause for the current lack of “true” distributed systems and study several systems that provide services that are implemented across a collection of computers, but appear as a single service to the user.
6 References
Reaching Agreement in the Presence of Faults
- 1980
Computer Science
JACM
It is shown that the problem is solvable for, and only for, n ≥ 3m + 1, where m is the number of faulty processors and n is the total number and this weaker assumption can be approximated in practice using cryptographic methods.
Authenticated Algorithms for Byzantine Agreement
- 1983
Computer Science
SIAM J. Comput.
This paper presents algorithms for reaching agreement based on authentication that require a total number of messages sent by correctly operating processors that is polynomial in both t and the number of processors, n.
Impossibility of distributed consensus with one faulty process
- 1983
Mathematics
PODS '83
It is shown that every protocol for this problem has the possibility of nontermination, even with only one faulty process, in the asynchronous consensus problem.
A method for obtaining digital signatures and public-key cryptosystems
- 1978
Computer Science, Mathematics
CACM
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.
New Directions in Cryptography
- 1976
Computer Science, Mathematics
IEEE Trans. Inf. Theory
This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.



