Liouville surface: Difference between revisions

From formulasearchengine
Jump to navigation Jump to search
en>Qetuth
m more specific stub type
 
en>Addbot
m Bot: Migrating 1 interwiki links, now provided by Wikidata on d:q284028
 
Line 1: Line 1:
When it сomеs to the mаin topic of nutrition, many people frequently imagine boring salads that come with iceberg lettuce аnd hothouse tomato plants. Eating sensibly, ɦowever, does not necessаrily mean that you need to qսit your plеasurе of food. In rеality, you are able to ǥain an entirely new outlook οn meals once you discover nutrition. These suggeѕtions can help you know [http://howardbkraftesq.com/articles/vigrx-plus-reviews-pictures-excellent-guide-on-how-to-get-a-healty-entire-body/ how long to use vigrx plus] food іtems can assist you іn nourishment.<br><br>Oat meal is a gгeat option being a breakfast food. Whenever you consume oatmeal every mоrning it will keep you full.<br><br>Follow a ɗiet regime full of whole grain products. Enhanced ϲarbohydrates will not be good for you, and folks that consume options are a lot less much healthiеr than tҺοse who take in grain. Trү to have servings of foods such as whole ԝheat loaveѕ of bread and brown rice, everyday. Cereals arе really rich in diet Ԁietary fiber as well as include a great deal of vitamins and minerals. The same can't be mentioned of sugars which are processed.<br><br>A fruit smoothіe is actually a delicious drink that is certainlƴ fun to make. You may even get them to more nourishing. Try including ɑ little bit of omeǥa-3 flax ѕeed gas for your smoothies, or some сocoa-natural powder. Both of those two substances is really a victor, sіnce they taste wonderful and will aѕsist in improving your defense operate.<br><br>Decreasе the sodium that you juѕt tаke in with your disɦes. Junk foods are goods that you could cut out of youг diet plan due to the amount of sodium they contain. By reducіng the volume of sea salt you eat, you may modify ʏour style bսds so that even small amօunts of sea sɑlt are sufficiеnt. This may force you to dislike the meals that you sҺould not consuming. You won't hungеr for them the maximum amount of.<br><br>Yօu could buy fruit juice if you don't lіke planning vegetables and fruits. Fruit juices are a fun way to acquire yoսr daily amount of nutritional vitamins and vіtamin without the need of havе tߋ hang aгound pealing, cutting up and cooking. In order to prevent tooth decay, [http://Mondediplo.com/spip.php?page=recherche&recherche=dentists dentists] advise іngesting fruit juice by way of a straw.<br><br>To incorporate much more nutrition if you are baking, look at whole wheat flour as opposеd to whіte flour. Whole wheat grains flour is less packaged than white flour, and in аddition features a lot more nutrition and dietary fiber.<br><br>Ingesting a bɑlanced diet will proviԁe you with a healthier visual appeal consequentlʏ making you really feel more dynamic. Cut down on highly processed sugаr tο get a lean body drastically. Keep an eye οut for awful meals and cocktaіls such as fruit juice and soft drinks take. These are loaded with unhealthy sugars. Reducing the amount օf sugars in wҺat yοu eat is likely to make a noticeable impact. Your system will appear mսch better, and you'll feel much better as well.<br><br>Don't use sea salt when boiling hot [http://Www.Reddit.com/r/howto/search?q=normal+water normal water]. TҺe rеason why to stop is that it basіcally contributes undeѕired ѕodium exactlƴ where we all dο not need it, inside oսr food. You must аlso avoid salting the food prior to tɑstе it. Food generally has a lot of sodium in it.<br><br>People with diabetes require diverse healthy needs as ߋpposed to others. These challenges may be managed ƅy eating with a tіmetаble as it helps to keep blood sugar at normal levels. People with dіabetes need to consume various vegatables and fruits in addition to [http://Www.Dict.cc/englisch-deutsch/whole-grain.html whole-grain] goods and lоwered fat dairy food. Pеople with diabetes ѕhould consume all around the same timе frame each day.<br><br>Extra virgin olive oil also can combat pores and skin dry skin. It seals the humіdity on the skin. Making use of extra virgin olive oіl on the skin might be a terrifіϲ way to protect against signs of aging as a  [http://eworldclassified.com/author/alfairfax/ vigrx plus at gnc] [http://meaningmakerbootcamp.com/groups/vigrx-plus-cvs-techniques-for-healthy-food-for-your-household/ vigrx plus cost in india] vs xytomax [[http://www.smssexdating247.nl/ads/vigrx-plus-price-in-pakistan-try-these-nutrition-methods-for-entire-body-overall-health/ you can check here]] result of ǥreat quantities of anti-oxidants inside the essential oіl. A slender coating work amazing things for yօur peгsonal skin area.<br><br>You should be cautioսs about bodү fat-free-labeled meals. Althouǥh these typeѕ of food are reduced in exсess fat, theƴ tend to make up for the missing out on еxcess fat by having a lot of additіonal sugar. Examine the food tag ѡith special care if you are consideгing purchasing these types of food.<br><br>Avoіd սsing thе micгowaѵe too mսch, еver since the meals which cаn be prеpared within are usually not that healthy. Feel better when you eat one of the most normal food items achievable.<br><br>To summarize, you will find limitless wayѕ that you can improve your diet regime. Throuǥh the use of tɦese pointers, yourself and your family can haѵе a fаr better, more healthy existence. Generating life time alterations coulɗ eventually be very helpful for yourself.
[[Byzantine fault tolerance|Byzantine fault tolerant]] [[Protocol (computing)|protocols]] are algorithms that are robust to arbitrary types of failures in [[distributed algorithms]]. With the advent and popularity of the [[Internet]], there is a need to develop algorithms that do not require any centralized control that have some guarantee of always working correctly. The Byzantine agreement protocol is an essential part of this task. In this article the quantum version of the Byzantine protocol,<ref name="Ben-Or">Michael Ben-Or and Avinatan Hassidim,
Fast quantum byzantine agreement,STOC '05: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing,
pg 481-485 [2005]</ref> which works in constant time is described.
 
==Introduction==
The [[Byzantine fault tolerance|Byzantine Agreement]] [[Communications protocol|protocol]] is a protocol in [[distributed computing]].
It takes its name from a problem formulated by Lamport, Shostak and Pease in 1982,<ref name="Lamport:1982">L. Lamport and R. Shostak and M. Pease,
The [[Byzantine]] Generals Problem, ACM Trans. Program. Lang. Syst., volume 4, number 3, pg 382-401 [1982]</ref> which itself is a reference to a historical problem.  The Byzantine army was divided into divisions with each division being led by a General with the following properties:
 
*Each General is either loyal or a traitor to the [[Byzantine|Byzantine state]].
*All Generals communicate by sending and receiving messages.
*There are only two commands: attack and retreat.
*All loyal Generals should agree on the same plan of action: attack or retreat.
*A small linear fraction of bad Generals should not cause the protocol to fail (less than a <math>\frac{1}{3}</math> fraction).
(See <ref name="Lynch">Michael J. Fisher, Nancy  A. Lynch,Michael S. Paterson,Impossibility of Distributed Consensus with One Faulty Process, Journal of the ACM volume 32, issue=2, pg 374-382 [http://portal.acm.org/citation.cfm?doid=3149.214121 Impossibility of Distributed Consensus with One Faulty Process][1985]</ref> for the proof of the impossibility result).  
The problem usually is equivalently restated in the form of a commanding General and loyal Lieutenants with the General being either loyal or a traitor and the same for the Lieutenants with the following properties.
 
*All loyal Lieutenants carry out the same order.
*If the commanding General is loyal, all loyal Lieutenants obey the order that he sends.
*A strictly less than <math>\frac{1}{3}</math> fraction including the commanding General are traitors.
 
==Byzantine Failure and Resilience==
Failures in an [[algorithm]] or [[Communications protocol|protocol]] can be categorized into three main types:
# A failure to take another execution step in the algorithm: This is usually referred to as a "fail stop" fault.
# A random failure to execute correctly: This is called a "random fault" or "random Byzantine" fault.
# An arbitrary failure where the algorithm fails to execute the steps correctly (usually in a clever way by some adversary to make the whole algorithm fail) which also encompasses the previous two types of faults; this is called a "Byzantine fault".
 
A Byzantine resilient or [[Byzantine fault tolerance|Byzantine fault tolerant]] protocol or algorithm is an algorithm that is robust to all the kinds of failures mentioned above. For example, given a space shuttle with multiple redundant processors and some of the processors give incorrect data, which processors or sets of processors should be believed? The solution can be formulated as a [[Byzantine fault tolerance|Byzantine fault tolerant]] protocol.
 
==Sketch of the Algorithm==
We will sketch here the asynchronous algorithm <ref name="Ben-Or">Michael Ben-Or and Avinatan Hassidim,
Fast quantum byzantine agreement, STOC '05: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing,
pg 481-485 [2005]</ref>
The algorithm works in two phases:
*Phase 1 (Communication phase):
:All messages are sent and received in this round.:A coin flipping protocol is a procedure that allows two parties A and B that do not trust each other to toss a coin to win a particular object.
There are two types of coin flipping protocols
** [[Quantum Coin Flipping|weak coin flipping]] protocols:<ref name="wiki:tossing">[http://arxiv.org/abs/quant-ph/0206121v2  I. Kerenidis, A. Nayak, coin flipping with small bias, arxiv]</ref> The two players A and B initially start with no inputs and they are to compute some value <math>c_{A},c_{B} \in [0,1]</math> and be able to accuse anyone of cheating. The protocol is successful if A and B agree on the outcome. The outcome 0 is defined as A winning and 1 as B winning. The protocol has the following properties:
***If both players are honest (they follow the protocol), then they agree on the outcome of the protocol <math> c_{A} = c_{B}</math> with <math> Pr(c_{A} = c_{B} = b) = \frac{1}{2}</math> for <math> a,b \in \{0, 1\}</math>.
***If one of the players is honest (i.e., the other player may deviate arbitrarily from the protocol in his or her local computation), then the other party wins with probability at most <math> \frac{1}{2} + \epsilon</math>. In other words, if B is dishonest, then <math>Pr(c_{A} = c_{B} = 1) \leq \frac{1}{2} + \epsilon</math>, and if A is dishonest, then <math>Pr(c_{A} = c_{B} = 0)\leq \frac{1}{2} + \epsilon </math>.
** A [[Quantum Coin Flipping|strong coin flipping protocol]]: In a strong coin flipping protocol, the goal is instead to produce a random bit which is biased away from any particular value 0 or 1. Clearly, any strong coin flipping protocol with bias <math>\epsilon</math> leads to weak coin flipping with the same bias.
 
===Verifiable secret sharing.===
* A [[verifiable secret sharing]] (VSS) protocol:<ref name="wiki:VSS">Verifiable secret sharing [[verifiable secret sharing]]</ref> A (n,k) [[secret sharing]] protocol allows a set of n players to share a secret, ''s'' such that only a quorum of k or more players can discover the secret. The player sharing (distributing the secret pieces) the secret is usually referred to as the dealer. A verifiable secret sharing protocol differs from a basic secret sharing protocol in that players can verify that their shares are consistent even in the presence of a malicious dealer.
 
===The Fail-stop protocol.===
 
====Protocol QuantumCoinFlip for player <math>P_i</math>====
#Round 1 generate the state <math>|Coin_i\rangle =\frac{1}{\sqrt{2}}|0,0,\ldots,0\rangle + \frac{1}{\sqrt{2}}|1,1,\ldots,1\rangle</math> on n [[qubits]] and send the kth [[qubit]] to the kth player keeping one part
# Generate the state <math>|Leader_i\rangle= \frac{1}{n^{3/2}}\sum _{a=1}^{n^3}|a,a,\ldots,a\rangle</math> on ''n'' qubits, an equal superposition of the numbers between 1 and <math>n^3</math>.Distribute the ''n'' [[qubits]] between all the players
# Receive the quantum messages from all players and wait for the next communication round, thus forcing the adversary to choose which messages were passed.
# Round 2: Measure (in the standard base) all <math>Leader_{j}</math> [[qubits]] received in round I. Select the player with the highest leader value (ties broken arbitrarily) as the "leader" of the round. Measure the leader’s coin in the standard base.
# Set the output of the QuantumCoinFlip protocol: <math>v_{i}</math> = measurement outcome of the leader’s coin.
 
===The Byzantine protocol.===
To generate a random coin assign an integer in the range [0,n-1] to each player and each player is not allowed to choose its own
random ID as each player <math>P_k</math> selects a random number <math>s{_{k}^{i}}</math> for every other player <math>P_{i}</math> and distributes  this using a verifiable secret sharing scheme.
 
At the end of this phase players agree on which secrets were properly shared, the secrets are then opened and each player <math>P_i</math> is assigned the value <math>s_i =\sum \, {s_{k}^{i}}{\text{for all secrets properly shared}}\mod n</math>
This requires private information channels so we replace the random secrets by the superposition <math>|\phi\rangle =\frac{1}{\sqrt{n}}\sum_{a=0}^{n-1}|a\rangle</math>. In which the state is encoded using a quantum verifiable secret sharing protocol (QVSS).<ref name="wiki:QVSS">Claude Cr´epeau, Daniel Gottesman and Adam Smith, Secure Multi-party Quantum Computation, In 34th ACM Symposium on the Theory of Computing, STOC, pg. 643–652, [2002]</ref> We cannot distribute the state <math>|\phi,\phi,\ldots \phi\rangle</math> since the bad players can collapse the state. To prevent bad players from doing so we encode the state using the Quantum verifiable secret sharing (QVSS) and send each player their share of the secret. Here again the verification requires Byzantine Agreement, but replacing the agreement by the grade-cast protocol is enough.<ref name="wiki:byzantine">Michael Ben-Or, Elan Pavlov, Vinod Vaikuntanathan, Byzantine Agreement in the Full-Information Model in O(log n) Rounds, STOC '06: Proceedings of the thirty-eighth annual ACM symposium on Theory of computing,
pg 179-186 [2006]</ref><ref name="wiki:prob">Pesech Feldman and Silvio Micali. An optimal probabilistic protocol for synchronous byzantine agreement. SIAM J. Comput., pg 873–933, [1997]</ref>
 
====Grade-cast protocol====
<!-- Missing image removed: [[Image:Broadcast.PNG|thumb|right|broadcast from dealer to players]] -->
A grade-cast protocol has the following properties using the definitions in <ref name="wiki:byzantine"/>
Informally, a graded [[Broadcasting (computing)|broadcast]] protocol is a protocol with a designated player called “dealer” (the one who broadcasts) such that:
# If the dealer is good, all the players get the same message.
# Even if the dealer is bad, if some good player accepts the message, all the good players get the same message (but they may or may not accept it).
A protocol P is said to be achieve graded [[Broadcasting (computing)|broadcast]] if, at the beginning of the protocol, a designated player D (called the dealer) holds a value v, and at the end of the protocol, every player <math>P_{i}</math> outputs a pair <math>(value_{i}, confidence_{i})
</math> such that the following properties hold:
<math>(\forall i, confidence_{i} \in \{0, 1, 2\})</math>
#If D is honest, then <math>value_{i}</math> = v and <math>confidence_{i}</math> = 2 for every honest player <math>P_i</math>.
# For any two honest players <math>P_{i}</math> and <math> P_{j},</math> <math>\vert confidence_{i} - confidence_{j}\vert \leq 1 </math>.
# (Consistency) For any two honest players <math>P_{i}</math> and <math>P_{j}</math>, if <math>confidence_{i}> 0</math> and <math> confidence_{j}> 0 </math>,then <math> value_{i}= value_{j}</math>.
 
For <math>t < \frac{n}{4}</math> the verification stage of the QVSS protocol guarantees that for a good dealer the correct state will be encoded, and that for any, possibly faulty dealer, some particular state will be recovered during the recovery stage. We note that for the purpose of our Byzantine quantum coin flip protocol the recovery stage is much simpler. Each player measures his share of the QVSS and sends the classical value to all other players. The verification stage guarantees, with high probability, that in the presence of up to <math>t < \frac{n}{4}</math> faulty players all the good players will recover the same classical value (which is the same value that would result from a direct measurement of the encoded state).
 
== Remarks ==
In 2007, a quantum protocol for Byzantine Agreement was demonstrated experimentally <ref name="wiki:byzexperiment">Sascha Gaertner, Mohamed Bourennane, Christian Kurtsiefer, Adán Cabello, Harald Weinfurter, Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection, [http://arxiv.org/abs/0710.0290v2 arXiv:0710.0290v2], [2007], [http://link.aps.org/doi/10.1103/PhysRevLett.100.070504 Phys. Rev. Lett. 100 (2008) 070504].</ref> using a four-photon polarization-entangled state. This shows that the quantum implementation of classical Byzantine Agreement protocols is indeed feasible.
 
== References ==
{{reflist|2}}
 
{{DEFAULTSORT:Quantum Byzantine Agreement}}
[[Category:Quantum mechanics]]
[[Category:Cryptography]]
[[Category:Distributed computing problems]]
[[Category:Fault tolerance]]
[[Category:Failure]]
[[Category:Theory of computation]]
 
[[ru:Задача византийских генералов]]
[[uk:Задача візантійських генералів]]

Latest revision as of 07:49, 18 March 2013

Byzantine fault tolerant protocols are algorithms that are robust to arbitrary types of failures in distributed algorithms. With the advent and popularity of the Internet, there is a need to develop algorithms that do not require any centralized control that have some guarantee of always working correctly. The Byzantine agreement protocol is an essential part of this task. In this article the quantum version of the Byzantine protocol,[1] which works in constant time is described.

Introduction

The Byzantine Agreement protocol is a protocol in distributed computing. It takes its name from a problem formulated by Lamport, Shostak and Pease in 1982,[2] which itself is a reference to a historical problem. The Byzantine army was divided into divisions with each division being led by a General with the following properties:

  • Each General is either loyal or a traitor to the Byzantine state.
  • All Generals communicate by sending and receiving messages.
  • There are only two commands: attack and retreat.
  • All loyal Generals should agree on the same plan of action: attack or retreat.
  • A small linear fraction of bad Generals should not cause the protocol to fail (less than a 13 fraction).

(See [3] for the proof of the impossibility result). The problem usually is equivalently restated in the form of a commanding General and loyal Lieutenants with the General being either loyal or a traitor and the same for the Lieutenants with the following properties.

  • All loyal Lieutenants carry out the same order.
  • If the commanding General is loyal, all loyal Lieutenants obey the order that he sends.
  • A strictly less than 13 fraction including the commanding General are traitors.

Byzantine Failure and Resilience

Failures in an algorithm or protocol can be categorized into three main types:

  1. A failure to take another execution step in the algorithm: This is usually referred to as a "fail stop" fault.
  2. A random failure to execute correctly: This is called a "random fault" or "random Byzantine" fault.
  3. An arbitrary failure where the algorithm fails to execute the steps correctly (usually in a clever way by some adversary to make the whole algorithm fail) which also encompasses the previous two types of faults; this is called a "Byzantine fault".

A Byzantine resilient or Byzantine fault tolerant protocol or algorithm is an algorithm that is robust to all the kinds of failures mentioned above. For example, given a space shuttle with multiple redundant processors and some of the processors give incorrect data, which processors or sets of processors should be believed? The solution can be formulated as a Byzantine fault tolerant protocol.

Sketch of the Algorithm

We will sketch here the asynchronous algorithm [1] The algorithm works in two phases:

  • Phase 1 (Communication phase):
All messages are sent and received in this round.:A coin flipping protocol is a procedure that allows two parties A and B that do not trust each other to toss a coin to win a particular object.

There are two types of coin flipping protocols

    • weak coin flipping protocols:[4] The two players A and B initially start with no inputs and they are to compute some value cA,cB[0,1] and be able to accuse anyone of cheating. The protocol is successful if A and B agree on the outcome. The outcome 0 is defined as A winning and 1 as B winning. The protocol has the following properties:
      • If both players are honest (they follow the protocol), then they agree on the outcome of the protocol cA=cB with Pr(cA=cB=b)=12 for a,b{0,1}.
      • If one of the players is honest (i.e., the other player may deviate arbitrarily from the protocol in his or her local computation), then the other party wins with probability at most 12+ϵ. In other words, if B is dishonest, then Pr(cA=cB=1)12+ϵ, and if A is dishonest, then Pr(cA=cB=0)12+ϵ.
    • A strong coin flipping protocol: In a strong coin flipping protocol, the goal is instead to produce a random bit which is biased away from any particular value 0 or 1. Clearly, any strong coin flipping protocol with bias ϵ leads to weak coin flipping with the same bias.

Verifiable secret sharing.

  • A verifiable secret sharing (VSS) protocol:[5] A (n,k) secret sharing protocol allows a set of n players to share a secret, s such that only a quorum of k or more players can discover the secret. The player sharing (distributing the secret pieces) the secret is usually referred to as the dealer. A verifiable secret sharing protocol differs from a basic secret sharing protocol in that players can verify that their shares are consistent even in the presence of a malicious dealer.

The Fail-stop protocol.

Protocol QuantumCoinFlip for player Pi

  1. Round 1 generate the state |Coini=12|0,0,,0+12|1,1,,1 on n qubits and send the kth qubit to the kth player keeping one part
  2. Generate the state |Leaderi=1n3/2a=1n3|a,a,,a on n qubits, an equal superposition of the numbers between 1 and n3.Distribute the n qubits between all the players
  3. Receive the quantum messages from all players and wait for the next communication round, thus forcing the adversary to choose which messages were passed.
  4. Round 2: Measure (in the standard base) all Leaderj qubits received in round I. Select the player with the highest leader value (ties broken arbitrarily) as the "leader" of the round. Measure the leader’s coin in the standard base.
  5. Set the output of the QuantumCoinFlip protocol: vi = measurement outcome of the leader’s coin.

The Byzantine protocol.

To generate a random coin assign an integer in the range [0,n-1] to each player and each player is not allowed to choose its own random ID as each player Pk selects a random number ski for every other player Pi and distributes this using a verifiable secret sharing scheme.

At the end of this phase players agree on which secrets were properly shared, the secrets are then opened and each player Pi is assigned the value si=skifor all secrets properly sharedmodn This requires private information channels so we replace the random secrets by the superposition |ϕ=1na=0n1|a. In which the state is encoded using a quantum verifiable secret sharing protocol (QVSS).[6] We cannot distribute the state |ϕ,ϕ,ϕ since the bad players can collapse the state. To prevent bad players from doing so we encode the state using the Quantum verifiable secret sharing (QVSS) and send each player their share of the secret. Here again the verification requires Byzantine Agreement, but replacing the agreement by the grade-cast protocol is enough.[7][8]

Grade-cast protocol

A grade-cast protocol has the following properties using the definitions in [7] Informally, a graded broadcast protocol is a protocol with a designated player called “dealer” (the one who broadcasts) such that:

  1. If the dealer is good, all the players get the same message.
  2. Even if the dealer is bad, if some good player accepts the message, all the good players get the same message (but they may or may not accept it).

A protocol P is said to be achieve graded broadcast if, at the beginning of the protocol, a designated player D (called the dealer) holds a value v, and at the end of the protocol, every player Pi outputs a pair (valuei,confidencei) such that the following properties hold: (i,confidencei{0,1,2})

  1. If D is honest, then valuei = v and confidencei = 2 for every honest player Pi.
  2. For any two honest players Pi and Pj, |confidenceiconfidencej|1.
  3. (Consistency) For any two honest players Pi and Pj, if confidencei>0 and confidencej>0,then valuei=valuej.

For t<n4 the verification stage of the QVSS protocol guarantees that for a good dealer the correct state will be encoded, and that for any, possibly faulty dealer, some particular state will be recovered during the recovery stage. We note that for the purpose of our Byzantine quantum coin flip protocol the recovery stage is much simpler. Each player measures his share of the QVSS and sends the classical value to all other players. The verification stage guarantees, with high probability, that in the presence of up to t<n4 faulty players all the good players will recover the same classical value (which is the same value that would result from a direct measurement of the encoded state).

Remarks

In 2007, a quantum protocol for Byzantine Agreement was demonstrated experimentally [9] using a four-photon polarization-entangled state. This shows that the quantum implementation of classical Byzantine Agreement protocols is indeed feasible.

References

43 year old Petroleum Engineer Harry from Deep River, usually spends time with hobbies and interests like renting movies, property developers in singapore new condominium and vehicle racing. Constantly enjoys going to destinations like Camino Real de Tierra Adentro.

ru:Задача византийских генералов uk:Задача візантійських генералів

  1. 1.0 1.1 Michael Ben-Or and Avinatan Hassidim, Fast quantum byzantine agreement,STOC '05: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, pg 481-485 [2005] Cite error: Invalid <ref> tag; name "Ben-Or" defined multiple times with different content
  2. L. Lamport and R. Shostak and M. Pease, The Byzantine Generals Problem, ACM Trans. Program. Lang. Syst., volume 4, number 3, pg 382-401 [1982]
  3. Michael J. Fisher, Nancy A. Lynch,Michael S. Paterson,Impossibility of Distributed Consensus with One Faulty Process, Journal of the ACM volume 32, issue=2, pg 374-382 Impossibility of Distributed Consensus with One Faulty Process[1985]
  4. I. Kerenidis, A. Nayak, coin flipping with small bias, arxiv
  5. Verifiable secret sharing verifiable secret sharing
  6. Claude Cr´epeau, Daniel Gottesman and Adam Smith, Secure Multi-party Quantum Computation, In 34th ACM Symposium on the Theory of Computing, STOC, pg. 643–652, [2002]
  7. 7.0 7.1 Michael Ben-Or, Elan Pavlov, Vinod Vaikuntanathan, Byzantine Agreement in the Full-Information Model in O(log n) Rounds, STOC '06: Proceedings of the thirty-eighth annual ACM symposium on Theory of computing, pg 179-186 [2006]
  8. Pesech Feldman and Silvio Micali. An optimal probabilistic protocol for synchronous byzantine agreement. SIAM J. Comput., pg 873–933, [1997]
  9. Sascha Gaertner, Mohamed Bourennane, Christian Kurtsiefer, Adán Cabello, Harald Weinfurter, Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection, arXiv:0710.0290v2, [2007], Phys. Rev. Lett. 100 (2008) 070504.