{"id":"https://openalex.org/W3046502842","doi":"https://doi.org/10.1145/3382734.3405708","title":"Brief Announcement: Not a COINcidence: Sub-Quadratic Asynchronous Byzantine Agreement WHP","display_name":"Brief Announcement: Not a COINcidence: Sub-Quadratic Asynchronous Byzantine Agreement WHP","publication_year":2020,"publication_date":"2020-07-31","ids":{"openalex":"https://openalex.org/W3046502842","doi":"https://doi.org/10.1145/3382734.3405708","mag":"3046502842"},"language":"en","primary_location":{"id":"doi:10.1145/3382734.3405708","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3382734.3405708","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th Symposium on Principles of Distributed Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023710177","display_name":"Shir Cohen","orcid":"https://orcid.org/0000-0001-9001-2387"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Shir Cohen","raw_affiliation_strings":["Technion"],"affiliations":[{"raw_affiliation_string":"Technion","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059238786","display_name":"Idit Keidar","orcid":"https://orcid.org/0000-0002-6417-1250"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Idit Keidar","raw_affiliation_strings":["Technion"],"affiliations":[{"raw_affiliation_string":"Technion","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021229048","display_name":"Alexander Spiegelman","orcid":"https://orcid.org/0000-0002-7148-0414"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alexander Spiegelman","raw_affiliation_strings":["VMware Research"],"affiliations":[{"raw_affiliation_string":"VMware Research","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023710177"],"corresponding_institution_ids":["https://openalex.org/I174306211"],"apc_list":null,"apc_paid":null,"fwci":0.9251,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.76964651,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"175","last_page":"177"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.8087553977966309},{"id":"https://openalex.org/keywords/byzantine-architecture","display_name":"Byzantine architecture","score":0.694143533706665},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6560350656509399},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6528619527816772},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.6478264927864075},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5713761448860168},{"id":"https://openalex.org/keywords/quantum-byzantine-agreement","display_name":"Quantum Byzantine agreement","score":0.54837965965271},{"id":"https://openalex.org/keywords/word","display_name":"Word (group theory)","score":0.4437296688556671},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37823188304901123},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3571380376815796},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33871597051620483},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24755531549453735},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2360553741455078},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18043261766433716},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.14641577005386353}],"concepts":[{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.8087553977966309},{"id":"https://openalex.org/C104562893","wikidata":"https://www.wikidata.org/wiki/Q47591","display_name":"Byzantine architecture","level":2,"score":0.694143533706665},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6560350656509399},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6528619527816772},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.6478264927864075},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5713761448860168},{"id":"https://openalex.org/C17532199","wikidata":"https://www.wikidata.org/wiki/Q17083590","display_name":"Quantum Byzantine agreement","level":4,"score":0.54837965965271},{"id":"https://openalex.org/C90805587","wikidata":"https://www.wikidata.org/wiki/Q10944557","display_name":"Word (group theory)","level":2,"score":0.4437296688556671},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37823188304901123},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3571380376815796},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33871597051620483},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24755531549453735},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2360553741455078},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18043261766433716},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.14641577005386353},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C195244886","wikidata":"https://www.wikidata.org/wiki/Q41493","display_name":"Ancient history","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3382734.3405708","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3382734.3405708","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th Symposium on Principles of Distributed Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1991153938","https://openalex.org/W1998351878","https://openalex.org/W2001271834","https://openalex.org/W2006699751","https://openalex.org/W2063229843","https://openalex.org/W2077963568","https://openalex.org/W2098104887","https://openalex.org/W2106004025","https://openalex.org/W2131848219","https://openalex.org/W2763398287","https://openalex.org/W2811175264","https://openalex.org/W2962882087","https://openalex.org/W3137092842","https://openalex.org/W3137220996","https://openalex.org/W4251986490"],"related_works":["https://openalex.org/W1698117324","https://openalex.org/W2292106967","https://openalex.org/W4290996430","https://openalex.org/W2109232026","https://openalex.org/W4210453042","https://openalex.org/W2997526278","https://openalex.org/W2775054947","https://openalex.org/W2146384899","https://openalex.org/W603186994","https://openalex.org/W2126087831"],"abstract_inverted_index":{"King":[0],"and":[1,23,36,93,122,133,150],"Saia":[2],"were":[3],"the":[4,8,33,41,51,58,65,96,100,155],"first":[5,59,101],"to":[6,60],"break":[7],"quadratic":[9],"word":[10,146],"complexity":[11,147],"bound":[12,27],"for":[13,99,159],"Byzantine":[14,46,120,139,161],"Agreement":[15,47,140],"in":[16,32,64,95,127],"synchronous":[17,34],"systems":[18],"against":[19,106],"an":[20],"adaptive":[21],"adversary,":[22,109],"Algorand":[24],"broke":[25],"this":[26,62],"with":[28,38,141,144],"near-optimal":[29],"resilience":[30],"(first":[31],"model":[35,98],"then":[37],"eventual-synchrony).":[39],"Yet":[40],"question":[42,63],"of":[43,53,70,119,148],"asynchronous":[44,97,160],"sub-quadratic":[45],"remained":[48],"open.":[49],"To":[50],"best":[52],"our":[54,71,134],"knowledge,":[55],"we":[56,91,137],"are":[57],"answer":[61],"affirmative.":[66],"A":[67,82],"key":[68],"component":[69],"solution":[72],"is":[73,86],"a":[74,80,107,145],"shared":[75,135],"coin":[76],"algorithm":[77],"based":[78],"on":[79],"VRF.":[81],"second":[83],"essential":[84],"ingredient":[85],"VRF-based":[87],"committee":[88,131],"sampling,":[89],"which":[90,110],"formalize":[92],"utilize":[94],"time.":[102],"Our":[103],"algorithms":[104],"work":[105],"delayed-adaptive":[108],"cannot":[111],"perform":[112],"after-the-fact":[113],"removals":[114],"but":[115],"has":[116],"full":[117,123],"control":[118],"processes":[121],"information":[124],"about":[125],"communication":[126],"earlier":[128],"rounds.":[129],"Using":[130],"sampling":[132],"coin,":[136],"solve":[138],"high":[142],"probability,":[143],"\u00d5(n)":[149],"O(1)":[151],"expected":[152],"time,":[153],"breaking":[154],"O(n2)":[156],"bit":[157],"barrier":[158],"Agreement.":[162]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
