Finding Traitors in Secure Networks Using Byzantine Agreements

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Accepted by International Journal of Network Security

Scientific paper

Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors in such networks. We use the original concept of the Byzantine Generals Problem by Lamport, and the more formal Byzantine Agreement describe by Linial, to nd traitors in secure networks. By applying general fault-tolerance methods to develop a more formal design of secure networks we are able to uncover traitors amongst a group of players. We also propose methods to integrate this system with insecure channels. This new resiliency can be applied to broadcast and peer-to-peer secure communication systems where agents may be traitors or become unreliable due to faults.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Finding Traitors in Secure Networks Using Byzantine Agreements does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Finding Traitors in Secure Networks Using Byzantine Agreements, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Finding Traitors in Secure Networks Using Byzantine Agreements will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-384337

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.