| dc.contributor.advisor | Srini Devadas. | en_US |
| dc.contributor.author | Chan, Benjamin Yao. | en_US |
| dc.contributor.other | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. | en_US |
| dc.date.accessioned | 2019-07-15T20:32:17Z | |
| dc.date.available | 2019-07-15T20:32:17Z | |
| dc.date.copyright | 2019 | en_US |
| dc.date.issued | 2019 | en_US |
| dc.identifier.uri | https://hdl.handle.net/1721.1/121665 | |
| dc.description | This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. | en_US |
| dc.description | Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019 | en_US |
| dc.description | Cataloged from student-submitted PDF version of thesis. | en_US |
| dc.description | Includes bibliographical references (page 37). | en_US |
| dc.description.abstract | Deterministic Byzantine Broadcast requires f+1 rounds for any f malicious processes, in the synchronous, authenticated setting. In the non-deterministic case, Katz and Koo [2] showed a lower-bound of [omega](2n=(n-f)) rounds, but it remains an open question whether the bound is tight, specically when f >/= n/2 (a dishonest majority). This thesis explores ways to improve the eciency of Byzantine Broadcast algorithms for a dishonest majority. In particular, we present an expected 10 round protocol for f = n/2, which works by constructing a hierarchy of quorums, to gather as many signatures as possible, before commitment. Finally, we offer brief commentary on how similar techniques could extend to f > n/2. | en_US |
| dc.description.statementofresponsibility | by Benjamin Yao Chan. | en_US |
| dc.format.extent | 37 pages ; | en_US |
| dc.language.iso | eng | en_US |
| dc.publisher | Massachusetts Institute of Technology | en_US |
| dc.rights | MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. | en_US |
| dc.rights.uri | http://dspace.mit.edu/handle/1721.1/7582 | en_US |
| dc.subject | Electrical Engineering and Computer Science. | en_US |
| dc.title | Synchronous Byzantine Broadcast algorithms for a dishonest majority | en_US |
| dc.type | Thesis | en_US |
| dc.description.degree | M. Eng. | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
| dc.identifier.oclc | 1102055620 | en_US |
| dc.description.collection | M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science | en_US |
| dspace.imported | 2019-07-15T20:32:14Z | en_US |
| mit.thesis.degree | Master | en_US |
| mit.thesis.department | EECS | en_US |