Skip to main content
Log in

Tolerating malicious gossip

  • Original article
  • Published:
Distributed Computing Aims and scope Submit manuscript

Abstract.

A new class of gossip protocols to diffuse updates securely is presented. The protocols rely on annotating updates with the path along which they travel. To avoid a combinatorial explosion in the number of annotated updates, rules are employed to choose which updates to keep. Different sets of rules lead to different protocols. Results of simulated executions for a collection of such protocols are described – the protocols would appear to be practical, even in large networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Additional information

Received: October 2001 / Accepted: July 2002

Supported in part by ARPA/RADC grant F30602-96-1-0317, AFOSR grant F49620-00-1-0198, Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory Air Force Material Command USAF under agreement number F30602-99-1-0533, National Science Foundation Grant 9703470, and a grant from Intel Corporation. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of these organizations or the U.S. Government.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Minsky, Y., Schneider, F. Tolerating malicious gossip. Distrib Comput 16, 49–68 (2003). https://doi.org/10.1007/s00446-002-0082-4

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00446-002-0082-4

Navigation