Alternative Scalable Architecture
Use physical trusted nodes assumed to be working under a weaker adversary: can crash and recover, but can not be compromised.
Take advantage of the trusted nodes to run an optimized Byzantine replication algorithm, potentially reducing the number of rounds.
Use protocols where communication over WAN only take place between trusted nodes, thus avoiding high-latency.
Similar approaches: [CLNV02, Ver03, SurS03]