The Sleepy Model of Consensus

  title={The Sleepy Model of Consensus},
  author={Iddo Bentov and Rafael Pass and Elaine Shi},
  booktitle={IACR Cryptology ePrint Archive},
The literature on distributed computing (as well as the cryptography literature) typically considers two types of players—honest players and corrupted players. Resilience properties are then analyzed assuming a lower bound on the fraction of honest players. Honest players, however, are not only assumed to follow the prescribed the protocol, but also assumed to be online throughout the whole execution of the protocol. The advent of “large-scale” consensus protocols (e.g., the blockchain protocol… CONTINUE READING
Highly Cited
This paper has 46 citations. REVIEW CITATIONS


Publications citing this paper.


Publications referenced by this paper.
Showing 1-10 of 37 references

ALGORAND: The Efficient and Democratic Ledger

ArXiv • 2016
View 10 Excerpts
Highly Influenced

The Bitcoin Backbone Protocol: Analysis and Applications

IACR Cryptology ePrint Archive • 2014
View 8 Excerpts
Highly Influenced

Practical Byzantine Fault Tolerance

View 6 Excerpts
Highly Influenced

Development of the Domain Name System

Computer Communication Review • 1995
View 3 Excerpts
Highly Influenced

Authenticated Algorithms for Byzantine Agreement

SIAM J. Comput. • 1983
View 5 Excerpts
Highly Influenced

Cryptocurrencies without Proof of Work

Financial Cryptography Workshops • 2016
View 2 Excerpts

Ouroboros: A provably secure proof-of-stake blockchain protocol

Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov
Cryptology ePrint Archive, Report 2016/889, • 2016
View 2 Excerpts

Similar Papers

Loading similar papers…