Skip to main navigation
Skip to search
Skip to main content
New Jersey Institute of Technology Home
Help & FAQ
Home
Profiles
Research units
Facilities
Federal Grants
Research output
Press/Media
Search by expertise, name or affiliation
Efficient Asynchronous Byzantine Agreement without Private Setups
Yingzi Gao
, Yuan Lu
, Zhenliang Lu
, Qiang Tang
, Jing Xu
, Zhenfeng Zhang
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
27
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Efficient Asynchronous Byzantine Agreement without Private Setups'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Distributed Key Generation
100%
Byzantine Agreement
100%
Byzantine Agreement Protocols
66%
Binary Agreement
66%
Common Coin
66%
Public Key Infrastructure
66%
Cryptographic Security
33%
Common Randomness
33%
Number of Parties
33%
Constant Rounds
33%
Asynchronous Networks
33%
Security Parameters
33%
Pluggable
33%
Generation Keys
33%
Generic Path
33%
Systematic Treatment
33%
Threshold Cryptosystem
33%
Random Beacon
33%
Leader Election Protocol
33%
Dynamic Reconfiguration
33%
Dynamic Participation
33%
Asynchronous Setting
33%
Computer Science
Key Generation
100%
Public Key Infrastructure
66%
Cryptography
33%
Reconfiguration
33%
Security Parameter
33%