{"id":"https://openalex.org/W2133217174","doi":"https://doi.org/10.1109/csfw.2002.1021814","title":"Polynomial fairness and liveness","display_name":"Polynomial fairness and liveness","publication_year":2003,"publication_date":"2003-06-25","ids":{"openalex":"https://openalex.org/W2133217174","doi":"https://doi.org/10.1109/csfw.2002.1021814","mag":"2133217174"},"language":"en","primary_location":{"id":"doi:10.1109/csfw.2002.1021814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csfw.2002.1021814","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004014878","display_name":"Michael Backes","orcid":"https://orcid.org/0000-0002-9326-6400"},"institutions":[{"id":"https://openalex.org/I91712215","display_name":"Saarland University","ror":"https://ror.org/01jdpyv68","country_code":"DE","type":"education","lineage":["https://openalex.org/I91712215"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"M. Backes","raw_affiliation_strings":["University of Saarland, Saarbrucken, Germany","Saarbrucken Univ., Germany"],"affiliations":[{"raw_affiliation_string":"University of Saarland, Saarbrucken, Germany","institution_ids":["https://openalex.org/I91712215"]},{"raw_affiliation_string":"Saarbrucken Univ., Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069656048","display_name":"B. Pfitzmann","orcid":"https://orcid.org/0009-0003-9460-6467"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]},{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["CH","US"],"is_corresponding":false,"raw_author_name":"B. Pfitzmann","raw_affiliation_strings":["IBM Zurich Research Laboratory, Ruschlikon, Switzerland","[IBM Zurich Research Laboratory, R\u00fcschlikon, Switzerland]"],"affiliations":[{"raw_affiliation_string":"IBM Zurich Research Laboratory, Ruschlikon, Switzerland","institution_ids":["https://openalex.org/I4210126328"]},{"raw_affiliation_string":"[IBM Zurich Research Laboratory, R\u00fcschlikon, Switzerland]","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075457822","display_name":"Michael Steiner","orcid":"https://orcid.org/0000-0003-3199-0935"},"institutions":[{"id":"https://openalex.org/I91712215","display_name":"Saarland University","ror":"https://ror.org/01jdpyv68","country_code":"DE","type":"education","lineage":["https://openalex.org/I91712215"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"M. Steiner","raw_affiliation_strings":["University of Saarland, Saarbrucken, Germany","Univ. of Saarland, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"University of Saarland, Saarbrucken, Germany","institution_ids":["https://openalex.org/I91712215"]},{"raw_affiliation_string":"Univ. of Saarland, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I91712215"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078166208","display_name":"Michael Waidner","orcid":"https://orcid.org/0000-0001-7919-9961"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]},{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH","US"],"is_corresponding":false,"raw_author_name":"M. Waidner","raw_affiliation_strings":["IBM Zurich Research Laboratory, Ruschlikon, Switzerland","[IBM Zurich Research Laboratory, R\u00fcschlikon, Switzerland]"],"affiliations":[{"raw_affiliation_string":"IBM Zurich Research Laboratory, Ruschlikon, Switzerland","institution_ids":["https://openalex.org/I4210126328"]},{"raw_affiliation_string":"[IBM Zurich Research Laboratory, R\u00fcschlikon, Switzerland]","institution_ids":["https://openalex.org/I1341412227"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5004014878"],"corresponding_institution_ids":["https://openalex.org/I91712215"],"apc_list":null,"apc_paid":null,"fwci":5.2084,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.9589935,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"160","last_page":"174"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.9869605302810669},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7529991865158081},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.5981193780899048},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5889890789985657},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5162205696105957},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.5158459544181824},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5084220767021179},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.4921821653842926},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34682774543762207},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30406591296195984},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2555457353591919},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24006161093711853}],"concepts":[{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.9869605302810669},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7529991865158081},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.5981193780899048},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5889890789985657},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5162205696105957},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.5158459544181824},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5084220767021179},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.4921821653842926},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34682774543762207},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30406591296195984},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2555457353591919},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24006161093711853},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/csfw.2002.1021814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csfw.2002.1021814","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.5.6433","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.6433","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.zurich.ibm.com/security/publications/./2002/BaPfStWa2002Liveness.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.59.693","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.693","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.zurich.ibm.com/~mbc/papers/BPSW_02Liveness.ps.gz","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1741528175","https://openalex.org/W1836078613","https://openalex.org/W2092422002","https://openalex.org/W2119708968","https://openalex.org/W2154613415","https://openalex.org/W2176300081","https://openalex.org/W2611515161","https://openalex.org/W2914206182","https://openalex.org/W3106753174","https://openalex.org/W3141585064","https://openalex.org/W3144368627","https://openalex.org/W6682817444"],"related_works":["https://openalex.org/W1565271071","https://openalex.org/W2081199208","https://openalex.org/W3349016","https://openalex.org/W3160870209","https://openalex.org/W2494011163","https://openalex.org/W2053262709","https://openalex.org/W2139648957","https://openalex.org/W1481041875","https://openalex.org/W2391970076","https://openalex.org/W10278191"],"abstract_inverted_index":{"Important":[0],"properties":[1,21],"of":[2,41,77,104,134,152],"many":[3],"protocols":[4,55],"are":[5],"liveness":[6,44,81,117,148],"or":[7],"availability,":[8],"i.e.":[9],"that":[10,115],"something":[11],"good":[12],"happens":[13],"now":[14],"and":[15,43,62,80,112,130,141],"then.":[16],"In":[17],"asynchronous":[18,83],"scenarios,":[19],"these":[20],"obviously":[22],"depend":[23],"on":[24,46],"the":[25,38,60,63,73,101,146],"scheduler,":[26],"which":[27,85,106],"is":[28,86,107,118],"usually":[29],"considered":[30],"to":[31,68,88,100,144],"be":[32,50],"fair":[33],"in":[34,82],"this":[35],"case.":[36],"Unfortunately,":[37],"standard":[39],"definitions":[40,96],"fairness":[42,79],"based":[45],"infinite":[47],"sequences":[48],"cannot":[49],"applied":[51],"for":[52],"most":[53],"cryptographic":[54,92],"since":[56],"one":[57],"must":[58],"restrict":[59],"adversary":[61],"runs":[64],"as":[65],"a":[66,98,131],"whole":[67],"polynomial":[69,78,116],"length.":[70],"We":[71],"present":[72,126],"first":[74],"general":[75],"definition":[76],"scenarios":[84],"suited":[87],"cope":[89],"with":[90,138],"arbitrary":[91],"protocols.":[93],"Furthermore,":[94],"our":[95],"provide":[97],"link":[99],"common":[102],"approach":[103],"simulatability":[105],"used":[108],"throughout":[109],"modern":[110],"cryptography,":[111],"we":[113,125],"show":[114],"maintained":[119],"under":[120],"simulatability.":[121],"As":[122],"an":[123,127],"example,":[124],"abstract":[128],"specification":[129],"secure":[132,135],"implementation":[133],"message":[136],"transmission":[137],"reliable":[139],"channels,":[140],"prove":[142],"them":[143],"fulfill":[145],"desired":[147],"property,":[149],"i.e.,":[150],"reliability":[151],"messages.":[153]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
