{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:27:53Z","timestamp":1770226073208,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1801487,1838251"],"award-info":[{"award-number":["1801487,1838251"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560638","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"595-608","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["The Generals' Scuttlebutt"],"prefix":"10.1145","author":[{"given":"Sandro","family":"Coretti","sequence":"first","affiliation":[{"name":"IOG, Zurich, Switzerland"}]},{"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[{"name":"University of Edinburgh &amp; IOG, Edinburgh, Scotland Uk"}]},{"given":"Cristopher","family":"Moore","sequence":"additional","affiliation":[{"name":"Santa Fe Institute, Santa Fe, NM, USA"}]},{"given":"Alexander","family":"Russell","sequence":"additional","affiliation":[{"name":"University of Connecticut &amp; IOG, Storrs, CT, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331629"},{"key":"e_1_3_2_1_2_1","volume-title":"Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In 2017 IEEE Symposium on Security and Privacy, SP 2017","author":"Apostolaki Maria","year":"2017","unstructured":"Maria Apostolaki , Aviv Zohar , and Laurent Vanbever . 2017 . Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In 2017 IEEE Symposium on Security and Privacy, SP 2017 , San Jose, CA, USA, May 22--26 , 2017. IEEE Computer Society, 375--392. https:\/\/doi.org\/10.1109\/SP.2017.29 10.1109\/SP.2017.29 Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22--26, 2017. IEEE Computer Society, 375--392. https:\/\/doi.org\/10.1109\/SP.2017.29"},{"key":"e_1_3_2_1_3_1","volume-title":"Reward Sharing Schemes for Stake Pools. In IEEE European Symposium on Security and Privacy, EuroS&P 2020","author":"Lars Br\u00fc","year":"2020","unstructured":"Lars Br\u00fc njes, Aggelos Kiayias , Elias Koutsoupias , and Aikaterini-Panagiota Stouka . 2020 . Reward Sharing Schemes for Stake Pools. In IEEE European Symposium on Security and Privacy, EuroS&P 2020 , Genoa, Italy, September 7--11 , 2020. IEEE, 256--275. https:\/\/doi.org\/10.1109\/EuroSP48549.2020.00024 10.1109\/EuroSP48549.2020.00024 Lars Br\u00fc njes, Aggelos Kiayias, Elias Koutsoupias, and Aikaterini-Panagiota Stouka. 2020. Reward Sharing Schemes for Stake Pools. In IEEE European Symposium on Security and Privacy, EuroS&P 2020, Genoa, Italy, September 7--11, 2020. IEEE, 256--275. https:\/\/doi.org\/10.1109\/EuroSP48549.2020.00024"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2688073.2688102"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.02.001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Sandro Coretti Aggelos Kiayias Cristopher Moore and Alexander Russell. 2022. The Generals\u00e2 Scuttlebutt: Byzantine-Resilient Gossip Protocols. Cryptology ePrint Archive Paper 2022\/541. https:\/\/eprint.iacr.org\/2022\/541  Sandro Coretti Aggelos Kiayias Cristopher Moore and Alexander Russell. 2022. The Generals\u00e2 Scuttlebutt: Byzantine-Resilient Gossip Protocols. Cryptology ePrint Archive Paper 2022\/541. https:\/\/eprint.iacr.org\/2022\/541","DOI":"10.1145\/3548606.3560638"},{"key":"e_1_3_2_1_8_1","unstructured":"D. Coutts N. Davies K. Knutsson M. Fontaine A. Santos M. Szamotulski and A. Vieth. 2022. The Shelley Networking Protocol. https:\/\/hydra.iohk.io\/build\/13272760\/download\/2\/network-spec.pdf.  D. Coutts N. Davies K. Knutsson M. Fontaine A. Santos M. Szamotulski and A. Vieth. 2022. The Shelley Networking Protocol. https:\/\/hydra.iohk.io\/build\/13272760\/download\/2\/network-spec.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"D. Coutts N. Davies M. Szamotulski and P. Thompson. 2020. Introduction to the design of the Data Diffusion and Networking for Cardano Shelley. https:\/\/hydra.iohk.io\/job\/Cardano\/ouroboros-network\/native.network-docs.x86_64-linux\/latest\/download\/1.  D. Coutts N. Davies M. Szamotulski and P. Thompson. 2020. Introduction to the design of the Data Diffusion and Networking for Cardano Shelley. https:\/\/hydra.iohk.io\/job\/Cardano\/ouroboros-network\/native.network-docs.x86_64-linux\/latest\/download\/1."},{"key":"e_1_3_2_1_10_1","volume-title":"FC 2019, Frigate Bay, St. Kitts and Nevis, February 18--22","volume":"11598","author":"Daian Phil","year":"2019","unstructured":"Phil Daian , Rafael Pass , and Elaine Shi . 2019 . Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake. In Financial Cryptography and Data Security - 23rd International Conference , FC 2019, Frigate Bay, St. Kitts and Nevis, February 18--22 , 2019, Revised Selected Papers (Lecture Notes in Computer Science), , Ian Goldberg and Tyler Moore (Eds.) , Vol. 11598 . Springer, 23--41. https:\/\/doi.org\/10.1007\/978--3-030--32101--7_2 10.1007\/978--3-030--32101--7_2 Phil Daian, Rafael Pass, and Elaine Shi. 2019. Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake. In Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18--22, 2019, Revised Selected Papers (Lecture Notes in Computer Science), , Ian Goldberg and Tyler Moore (Eds.), Vol. 11598. Springer, 23--41. https:\/\/doi.org\/10.1007\/978--3-030--32101--7_2"},{"key":"e_1_3_2_1_11_1","volume-title":"Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. In EUROCRYPT","author":"David Bernardo","year":"2018","unstructured":"Bernardo David , Peter Gazi , Aggelos Kiayias , and Alexander Russell . 2018 . Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. In EUROCRYPT 2018, Part II (LNCS ), , Jesper Buus Nielsen and Vincent Rijmen (Eds.), Vol. 10821 . Springer , Heidelberg, 66--98. https:\/\/doi.org\/10.1007\/978--3--319--78375--8_3 10.1007\/978--3--319--78375--8_3 Bernardo David, Peter Gazi, Aggelos Kiayias, and Alexander Russell. 2018. Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. In EUROCRYPT 2018, Part II (LNCS ), , Jesper Buus Nielsen and Vincent Rijmen (Eds.), Vol. 10821. Springer, Heidelberg, 66--98. https:\/\/doi.org\/10.1007\/978--3--319--78375--8_3"},{"key":"e_1_3_2_1_12_1","volume-title":"6th ACM PODC, , Fred B","author":"Demers Alan J.","year":"1840","unstructured":"Alan J. Demers , Daniel H. Greene , Carl Hauser , Wes Irish , John Larson , Scott Shenker , Howard E. Sturgis , Daniel C. Swinehart , and Douglas B. Terry . 1987 a. Epidemic Algorithms for Replicated Database Maintenance . In 6th ACM PODC, , Fred B . Schneider (Ed.). ACM , 1--12. https:\/\/doi.org\/10.1145\/4 1840 .41841 10.1145\/41840.41841 Alan J. Demers, Daniel H. Greene, Carl Hauser, Wes Irish, John Larson, Scott Shenker, Howard E. Sturgis, Daniel C. Swinehart, and Douglas B. Terry. 1987 a. Epidemic Algorithms for Replicated Database Maintenance. In 6th ACM PODC, , Fred B. Schneider (Ed.). ACM, 1--12. https:\/\/doi.org\/10.1145\/41840.41841"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217061"},{"key":"e_1_3_2_1_15_1","volume-title":"24th USENIX Security Symposium, USENIX Security 15","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman , Alison Kendler , Aviv Zohar , and Sharon Goldberg . 2015 . Eclipse Attacks on Bitcoin's Peer-to-Peer Network . In 24th USENIX Security Symposium, USENIX Security 15 , Washington, D.C., USA, August 12--14 , 2015, , Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, 129--144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12--14, 2015, , Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, 129--144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman"},{"key":"e_1_3_2_1_16_1","volume-title":"41st","author":"Karp Richard M.","year":"2000","unstructured":"Richard M. Karp , Christian Schindelhauer , Scott Shenker , and Berthold V\u00f6cking . 2000 a. Randomized Rumor Spreading . In 41st FOCS. IEEE Computer Society Press , 565--574. https:\/\/doi.org\/10.1109\/SFCS. 2000 .892324 10.1109\/SFCS.2000.892324 Richard M. Karp, Christian Schindelhauer, Scott Shenker, and Berthold V\u00f6cking. 2000 a. Randomized Rumor Spreading. In 41st FOCS. IEEE Computer Society Press, 565--574. https:\/\/doi.org\/10.1109\/SFCS.2000.892324"},{"key":"e_1_3_2_1_17_1","volume-title":"Randomized Rumor Spreading. In 41st Annual Symposium on Foundations of Computer Science, FOCS 2000","author":"Karp Richard M.","year":"2000","unstructured":"Richard M. Karp , Christian Schindelhauer , Scott Shenker , and Berthold V\u00f6 cking. 2000 b . Randomized Rumor Spreading. In 41st Annual Symposium on Foundations of Computer Science, FOCS 2000 , 12--14 November 2000, Redondo Beach, California, USA. IEEE Computer Society, 565--574. https:\/\/doi.org\/10.1109\/SFCS. 2000.892324 10.1109\/SFCS.2000.892324 Richard M. Karp, Christian Schindelhauer, Scott Shenker, and Berthold V\u00f6 cking. 2000 b. Randomized Rumor Spreading. In 41st Annual Symposium on Foundations of Computer Science, FOCS 2000, 12--14 November 2000, Redondo Beach, California, USA. IEEE Computer Society, 565--574. https:\/\/doi.org\/10.1109\/SFCS.2000.892324"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1317379.1317381"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_20_1","unstructured":"Chen-Da Liu-Zhang Christian Matt Ueli Maurer Guilherme Rito and S\u00c3\u00b8ren Eller Thomsen. 2022. Practical Provably Secure Flooding for Blockchains. Cryptology ePrint Archive Paper 2022\/608. https:\/\/eprint.iacr.org\/2022\/608  Chen-Da Liu-Zhang Christian Matt Ueli Maurer Guilherme Rito and S\u00c3\u00b8ren Eller Thomsen. 2022. Practical Provably Secure Flooding for Blockchains. Cryptology ePrint Archive Paper 2022\/608. https:\/\/eprint.iacr.org\/2022\/608"},{"key":"e_1_3_2_1_21_1","volume-title":"Jesper Buus Nielsen, and S\u00c3\u00b8ren Eller Thomsen","author":"Matt Christian","year":"2022","unstructured":"Christian Matt , Jesper Buus Nielsen, and S\u00c3\u00b8ren Eller Thomsen . 2022 . Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks. Cryptology ePrint Archive, Paper 2022\/010. https:\/\/eprint.iacr.org\/2022\/010 Christian Matt, Jesper Buus Nielsen, and S\u00c3\u00b8ren Eller Thomsen. 2022. Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks. Cryptology ePrint Archive, Paper 2022\/010. https:\/\/eprint.iacr.org\/2022\/010"},{"key":"e_1_3_2_1_22_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system . http:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. http:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_23_1","volume-title":"Securing Proof-of-Stake Nakamoto Consensus Under Bandwidth Constraint. CoRR","author":"Neu Joachim","year":"2021","unstructured":"Joachim Neu , Srivatsan Sridhar , Lei Yang , David Tse , and Mohammad Alizadeh . 2021. Securing Proof-of-Stake Nakamoto Consensus Under Bandwidth Constraint. CoRR , Vol. abs\/ 2111 .12332 ( 2021 ). showeprint[arXiv]2111.12332 https:\/\/arxiv.org\/abs\/2111.12332 Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse, and Mohammad Alizadeh. 2021. Securing Proof-of-Stake Nakamoto Consensus Under Bandwidth Constraint. CoRR , Vol. abs\/2111.12332 (2021). showeprint[arXiv]2111.12332 https:\/\/arxiv.org\/abs\/2111.12332"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355469"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/135419.135437"},{"key":"e_1_3_2_1_26_1","volume-title":"6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15--17, 2009. Proceedings (Lecture Notes in Computer Science), Omer Reingold (Ed.)","volume":"5444","author":"Zikas Vassilis","unstructured":"Vassilis Zikas , Sarah Hauser , and Ueli M. Maurer . 2009. Realistic Failures in Secure Multi-party Computation. In Theory of Cryptography , 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15--17, 2009. Proceedings (Lecture Notes in Computer Science), Omer Reingold (Ed.) , Vol. 5444 . Springer, 274--293. https:\/\/doi.org\/10.1007\/978--3--642-00457--5_17 io 10.1007\/978--3--642-00457--5_17 Vassilis Zikas, Sarah Hauser, and Ueli M. Maurer. 2009. Realistic Failures in Secure Multi-party Computation. In Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15--17, 2009. Proceedings (Lecture Notes in Computer Science), Omer Reingold (Ed.), Vol. 5444. Springer, 274--293. https:\/\/doi.org\/10.1007\/978--3--642-00457--5_17 io"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560638","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560638","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:59Z","timestamp":1750182539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560638"}},"subtitle":["Byzantine-Resilient Gossip Protocols"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":26,"alternative-id":["10.1145\/3548606.3560638","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560638","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}