BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration
Notes
- It is an SMR protocol.
- Although not stated explicitly, it uses the standard safety-liveness SMR definition.
- It is in the partially synchronous network model.
- Although not stated explicitly, I believe that they are adaptively secure.
References
Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang. 2014. “BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration.” http://link.springer.com/10.1007/978-3-319-14472-6_7.