Byzantine fault-tolerant consensus algorithms: A survey

W Zhong, C Yang, W Liang, J Cai, L Chen, J Liao… - Electronics, 2023 - mdpi.com
The emergence of numerous consensus algorithms for distributed systems has resulted from
the swift advancement of blockchain and its related technologies. Consensus algorithms …

Bft in blockchains: From protocols to use cases

X Wang, S Duan, J Clavin, H Zhang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
A blockchain is a distributed system that achieves strong security guarantees in storing,
managing, and processing data. All blockchains achieve a common goal: building a …

Blockchains for government: use cases and challenges

J Clavin, S Duan, H Zhang, VP Janeja… - … : Research and Practice, 2020 - dl.acm.org
Blockchain is the technology used by developers of cryptocurrencies, like Bitcoin, to enable
exchange of financial “coins” between participants in the absence of a trusted third party to …

Foundations of dynamic bft

S Duan, H Zhang - 2022 IEEE Symposium on Security and …, 2022 - ieeexplore.ieee.org
This paper studies dynamic BFT, where replicas can join and leave the system dynamically,
a primitive that is nowadays increasingly needed. We provide a formal treatment for dynamic …

Marlin: Two-phase BFT with linearity

X Sui, S Duan, H Zhang - 2022 52nd Annual IEEE/IFIP …, 2022 - ieeexplore.ieee.org
As the first Byzantine fault-tolerant (BFT) protocol with linear communication complexity,
HotStuff (PODC 2019) has received significant attention. HotStuff has three round-trips for …

Poligraph: Intrusion-tolerant and distributed fake news detection system

G Shan, B Zhao, JR Clavin, H Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We present Poligraph, an intrusion-tolerant and decentralized fake news detection system.
Poligraph aims to address architectural, system, technical, and social challenges of building …

A filter feature selection algorithm based on mutual information for intrusion detection

F Zhao, J Zhao, X Niu, S Luo, Y Xin - Applied Sciences, 2018 - mdpi.com
For a large number of network attacks, feature selection is used to improve intrusion
detection efficiency. A new mutual information algorithm of the redundant penalty between …

Secure causal atomic broadcast, revisited

S Duan, MK Reiter, H Zhang - 2017 47th Annual IEEE/IFIP …, 2017 - ieeexplore.ieee.org
We revisit the problem of preserving causality in Byzantine fault-tolerant (BFT) atomic
broadcast protocols, a requirement first proposed by Reiter and Birman (TOPLAS 1994) …

DBFT: A Byzantine fault tolerance protocol with graceful performance degradation

J Zhang, Y Rong, J Cao, C Rong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Byzantine Fault Tolerant (BFT) state machine replication protocols are used to achieve
agreement among replicated servers with arbitrary faults. Most existing BFT protocols …

Sok: understanding BFT consensus in the age of blockchains

G Wang - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Blockchain as an enabler to current Internet infrastructure has provided many unique
features and revolutionized current distributed systems into a new era. Its decentralization …