This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Implementing Trustworthy Services Using Replicated State Machines
September/October 2005 (vol. 3 no. 5)
pp. 34-43
Fred B. Schneider, Cornell University
Lidong Zhou, Microsoft Research Silicon Valley
A thread of research has emerged to investigate the interactions of replication with threshold cryptography for use in environments that satisfy weak assumptions. The result is a new paradigm known as distributed trust; this article attempts to survey that landscape.
Index Terms:
cryptography, trusted systems, state machines
Citation:
Fred B. Schneider, Lidong Zhou, "Implementing Trustworthy Services Using Replicated State Machines," IEEE Security & Privacy, vol. 3, no. 5, pp. 34-43, Sept.-Oct. 2005, doi:10.1109/MSP.2005.125
Usage of this product signifies your acceptance of the Terms of Use.