Transformations in secure and fault-tolerant distributed computation
We present a survey of different techniques used by the authors to transform a security or fault-tolerance problem into another with a known solution. We consider the following two cases: (1) reducing a security problem into a fault-tolerance problem; (2) reducing a fault-tolerant problem into its fault-intolerant version. In these cases it is possible to reuse known solutions to construct new efficient algorithms.
Full Text: PDF