Building a real-world secure distributed system that can be used in practice is challenging. It usually needs to (progressively) satisfy a number of core requirements---functionality, performance, reliability, security, and privacy. However, security and privacy concerns are usually at odds with the rest of the requirements.;The thesis illustrates how to design and implement real-world distributed systems that are efficient, reliable, secure, and scalable, by leveraging a wide range of techniques from the field of applied cryptography, security (e.g., intrusion detection), and reliable distributed system (e.g., state machine replication). They include a general Byzantine fault-tolerant (BFT) state machine replicated system that is designed to be as efficient as conventional state machine replicated systems and be highly resilient to various attacks, a novel distributed signature system enabling member anonymity and misbehavior detection, and a fundamentally important, provably secure system that enables security to be established from well-studied, standard Computational Diffie-Hellman (CDH) assumptions over finite fields and resolves long-standing open problems in cryptography.
展开▼