Session 1

  • Speakers: Shikha & Ishita
  • Logistics: Time & Date: 2nd June 3pm, Room 329, CSA, IISc
  • Theme: Foundations.
  • Description: Detailed EIG protocol for Byzantine adversaries
  • References: [Chapter 6 of Nancy Lynch ].

Session 2

  • Speakers: Debantu & Primula
  • Logistics: Time & Date: 7th June 3pm, Room 329, CSA, IISc
  • Theme: Foundations.
  • Description: Polynomial Byzantine Agreement
  • References: [Chapter 6 of Nancy Lynch]

Session 3

  • Speakers: Naman & Shikha
  • Logistics: Time & Date: 14th June 3pm, Room 329, CSA, IISc
  • Theme: Optimizations of Byzantine Agreement.
  • Description: Communication efficient, round optimal Byzantine Agreement
  • References: [MW94]

Session 4

  • Speakers: Ishita & Rishab
  • Logistics: Time & Date: 16th June 3pm, Room 329, CSA, IISc
  • Theme: Optimizing Byzantine Agreement.
  • Description: Obtaining fully polynomial, round optimal Byzantine Agreement
  • References: [GM98]

Session 5

  • Speakers: Megha & Gayatri
  • Logistics: Time & Date TBD, Room 329, CSA, IISc
  • Theme: Optimizations in terms of complexity
  • Description: Optimizing bit complexity in distributed consensus and Byzantine Agreement.
  • References: [BGP92, CW92]

Session 6

  • Speakers: Debantu & Naman
  • Logistics: Time & Date TBD, Room 329, CSA, IISc
  • Theme: Probabilistic protocols
  • Description: Introducing optimal probabilistic protocols for Byzantine Agreement.
  • References: [FM]

Session 7

  • Speakers: Lasya & Rishab
  • Logistics: Time & Date TBD, Room 329, CSA, IISc
  • Theme: Authenticated Byzantine Agreement.
  • Description: Illustrating expected constant round protocols for Byzantine Agreement.
  • References: [KK06]

Session 8

  • Speakers: Megha, Gayatri & Naman
  • Logistics: Time & Date TBD, Room 329, CSA, IISc
  • Theme: Authenticated Byzantine Agreement with information theoretic security.
  • Description: Illustrating the use of pseudo-signatures to achieve Byzantine Agreement with resilience t>=n/3
  • References: [PW96, BHR07]

Session 9

  • Speakers: Debantu & Rishab
  • Logistics: Time & Date TBD, Room 329, CSA, IISc
  • Theme: Authenticated Byzantine Agreement.
  • Description: Exploring more authenticated algorithms.
  • References: [DS83]

Session 10

  • Speakers: Megha, Gayatri & Ishita
  • Logistics: Time & Date TBD, Room 329, CSA, IISc
  • Theme: Authenticated Broadcast.
  • Description: Exploring authenticated broadcast in dishonest majority.
  • References: [GKKO07]