Abstract.
A new class of gossip protocols to diffuse updates securely is presented. The protocols rely on annotating updates with the path along which they travel. To avoid a combinatorial explosion in the number of annotated updates, rules are employed to choose which updates to keep. Different sets of rules lead to different protocols. Results of simulated executions for a collection of such protocols are described – the protocols would appear to be practical, even in large networks.
Similar content being viewed by others
Author information
Authors and Affiliations
Additional information
Received: October 2001 / Accepted: July 2002
Supported in part by ARPA/RADC grant F30602-96-1-0317, AFOSR grant F49620-00-1-0198, Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory Air Force Material Command USAF under agreement number F30602-99-1-0533, National Science Foundation Grant 9703470, and a grant from Intel Corporation. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of these organizations or the U.S. Government.
Rights and permissions
About this article
Cite this article
Minsky, Y., Schneider, F. Tolerating malicious gossip. Distrib Comput 16, 49–68 (2003). https://doi.org/10.1007/s00446-002-0082-4
Issue Date:
DOI: https://doi.org/10.1007/s00446-002-0082-4