Scalable dynamic multi-agent practical byzantine fault-tolerant consensus in permissioned blockchain

L Feng, H Zhang, Y Chen, L Lou - Applied Sciences, 2018 - mdpi.com
The permissioned blockchain system has recently become popular in a wide range of
scenarios, such as artificial intelligence, financial applications and the Internet of things, due …

Proof of work without all the work

D Gupta, J Saia, M Young - … of the 19th international conference on …, 2018 - dl.acm.org
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …

A fully-distributed scalable peer-to-peer protocol for byzantine-resilient distributed hash tables

J Augustine, S Chatterjee, G Pandurangan - Proceedings of the 34th …, 2022 - dl.acm.org
Performing computation in the presence of faulty and malicious nodes is a central problem
in distributed computing. Over 35 years ago, Dwork, Peleg, Pippenger, and Upfal [STOC …

Enabling robust and efficient distributed computation in dynamic peer-to-peer networks

J Augustine, G Pandurangan… - 2015 IEEE 56th …, 2015 - ieeexplore.ieee.org
Motivated by the need for designing efficient and robust fully-distributed computation in
highly dynamic networks such as Peer-to-Peer (P2P) networks, we study distributed …

Distributed algorithmic foundations of dynamic networks

J Augustine, G Pandurangan, P Robinson - ACM SIGACT News, 2016 - dl.acm.org
Dynamic Networks. Large real-world networks are inherently very dynamic: the participants
in peer-to-peer (P2P) networks change over time, mobile nodes in wireless networks move …

Spartan: A framework for sparse robust addressable networks

J Augustine, S Sivasubramaniam - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
A Peer-to-Peer (P2P) network is a dynamic collection of nodes that connect with each other
via virtual overlay links built upon an underlying network (usually, the Internet). Typical P2P …

Resource burning for permissionless systems

D Gupta, J Saia, M Young - International Colloquium on Structural …, 2020 - Springer
Proof-of-work puzzles and CAPTCHAS consume enormous amounts of energy and time.
These techniques are examples of resource burning: verifiable consumption of resources …

Leader election in well-connected graphs

S Gilbert, P Robinson, S Sourav - … of the 2018 ACM Symposium on …, 2018 - dl.acm.org
In this paper, we look at the problem of randomized leader election in synchronous
distributed networks with a special focus on the message complexity. We provide an …

Fully-Distributed Byzantine Agreement in Sparse Networks

J Augustine, F Dufoulon, G Pandurangan - … of the 2025 Annual ACM-SIAM …, 2025 - SIAM
Byzantine agreement is a fundamental problem in fault-tolerant distributed networks that has
been studied intensively for the last four decades. Most of these works designed protocols …

Broadcast CONGEST algorithms against adversarial edges

Y Hitron, M Parter - arXiv preprint arXiv:2004.06436, 2020 - arxiv.org
We consider the corner-stone broadcast task with an adaptive adversary that controls a fixed
number of $ t $ edges in the input communication graph. In this model, the adversary sees …