{"id":2329,"date":"2024-02-13T12:36:48","date_gmt":"2024-02-13T11:36:48","guid":{"rendered":"https:\/\/pb.edu.pl\/cisim\/?page_id=2329"},"modified":"2024-02-13T12:37:41","modified_gmt":"2024-02-13T11:37:41","slug":"nabendu-chaki-abstract","status":"publish","type":"page","link":"https:\/\/pb.edu.pl\/cisim\/previous-conferences\/cisim-2023\/keynote-speakers\/nabendu-chaki-abstract\/","title":{"rendered":"Nabendu Chaki \u2013 Abstract"},"content":{"rendered":"<p><strong>Title:<\/strong>&nbsp;Berserk Detection in Distributed Ledger Systems<\/p>\n<p style=\"text-align: left\"><strong>Abstract:&nbsp;<\/strong>Emerging distributed ledger technologies are not based on Proof of<br \/>\nWork or Proof of Stake consensus protocols. Lightweight protocols<br \/>\nbased on the voter model are often used. However, these protocols are<br \/>\nfraught with a particular type of Byzantine adversary known as Berserk<br \/>\nadversaries who intend to break the consensus. Besides, the existing<br \/>\nmethod of Berserk detection involves the exchange of signatures which<br \/>\nrequires key servers that are subject to a single point of failure. In<br \/>\nthis lecture, the presenter a novel and recent approach to Berserk<br \/>\ndetection. Unlike most of the existing methods of detection, the<br \/>\nproposed method does not use signatures for the detection of Berserk<br \/>\nbehavior. This opens up the possibility of a more secure distributed<br \/>\nenvironment, where ensuring anonymity in terms of the identity of nodes<br \/>\nis crucial.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Title:&nbsp;Berserk Detection in Distributed Ledger Systems Abstract:&nbsp;Emerging distributed ledger technologies are not based on Proof<\/p>\n","protected":false},"author":161,"featured_media":0,"parent":2304,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-2329","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/pb.edu.pl\/cisim\/wp-json\/wp\/v2\/pages\/2329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pb.edu.pl\/cisim\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pb.edu.pl\/cisim\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pb.edu.pl\/cisim\/wp-json\/wp\/v2\/users\/161"}],"replies":[{"embeddable":true,"href":"https:\/\/pb.edu.pl\/cisim\/wp-json\/wp\/v2\/comments?post=2329"}],"version-history":[{"count":0,"href":"https:\/\/pb.edu.pl\/cisim\/wp-json\/wp\/v2\/pages\/2329\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/pb.edu.pl\/cisim\/wp-json\/wp\/v2\/pages\/2304"}],"wp:attachment":[{"href":"https:\/\/pb.edu.pl\/cisim\/wp-json\/wp\/v2\/media?parent=2329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}