{"id":1282,"date":"2017-01-10T15:35:15","date_gmt":"2017-01-10T15:35:15","guid":{"rendered":"https:\/\/prismacloud.eu\/?p=1282"},"modified":"2018-04-27T11:27:15","modified_gmt":"2018-04-27T11:27:15","slug":"pbft-and-secret-sharing-in-storage-settings","status":"publish","type":"post","link":"https:\/\/prismacloud.eu\/pbft-and-secret-sharing-in-storage-settings\/","title":{"rendered":"Malicious Clients in Distributed Secret Sharing Based Storage Networks"},"content":{"rendered":"<p><strong>Title<\/strong><\/p>\n<p class=\"nova-e-text nova-e-text--size-xxxl nova-e-text--family-sans-serif nova-e-text--spacing-l nova-e-text--color-grey-900\">Malicious Clients in Distributed Secret Sharing Based Storage Networks<\/p>\n<p><strong>Authors<\/strong><\/p>\n<p>Andreas Happe, Thomas Loruenser, Stephan Krenn (AIT Austrian Institute of Technology)<\/p>\n<p><strong>Abstract<\/strong><\/p>\n<p style=\"text-align: justify;\">Recent publications combine secret-sharing with byzantine fault-tolerant distribution schemes into safe and secure storage systems. To our knowledge current publications describe chosen algorithms and implementations but do not highlight areas of conflict between secret-sharing and BFT algorithms in a systematic fashing. This paper presents different concrete problem areas and suggests possible solutions.<\/p>\n<p><strong>Venue<\/strong><\/p>\n<p>Twenty-fourth International Workshop on Security Protocol (https:\/\/www.engr.mun.ca\/~spw2016\/)<\/p>\n<p><strong>Place and Date<\/strong><\/p>\n<p>Brno, Czech Republic \u2014 7-8 April 2016<\/p>\n<p>[<a href=\"https:\/\/prismacloud.eu\/wp-content\/uploads\/2017\/01\/PBFT-and-Secret-Sharing-in-Storage-Settings.pdf\">Download<\/a>]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent publications combine secret-sharing with byzantine fault-tolerant distribution schemes into safe and secure storage systems. To our knowledge current publications describe chosen algorithms and implementations but do not highlight areas of conflict between secret-sharing and BFT algorithms in a systematic fashing. This paper presents different concrete problem areas and suggests possible solutions.<\/p>\n","protected":false},"author":2,"featured_media":1576,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,8],"tags":[],"_links":{"self":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1282"}],"collection":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/comments?post=1282"}],"version-history":[{"count":6,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1282\/revisions"}],"predecessor-version":[{"id":2759,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1282\/revisions\/2759"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media\/1576"}],"wp:attachment":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media?parent=1282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/categories?post=1282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/tags?post=1282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}