{"id":"https://openalex.org/W4312321278","doi":"https://doi.org/10.1007/978-3-031-15979-4_14","title":"Formalizing\u00a0Delayed\u00a0Adaptive\u00a0Corruptions and\u00a0the\u00a0Security of\u00a0Flooding Networks","display_name":"Formalizing\u00a0Delayed\u00a0Adaptive\u00a0Corruptions and\u00a0the\u00a0Security of\u00a0Flooding Networks","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4312321278","doi":"https://doi.org/10.1007/978-3-031-15979-4_14"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-15979-4_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-15979-4_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://pure.au.dk/portal/en/publications/d3ff4f84-6db7-4b7b-83af-b4a0e95b19cc","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033255115","display_name":"Christian Matt","orcid":"https://orcid.org/0000-0001-5900-336X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Christian Matt","raw_affiliation_strings":["Concordium, Zurich, Switzerland"],"raw_orcid":"https://orcid.org/0000-0001-5900-336X","affiliations":[{"raw_affiliation_string":"Concordium, Zurich, Switzerland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067885668","display_name":"Jesper Buus Nielsen","orcid":"https://orcid.org/0000-0002-7074-0683"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Jesper Buus Nielsen","raw_affiliation_strings":["Concordium Blockchain Research Center, Aarhus University, Aarhus, Denmark"],"raw_orcid":"https://orcid.org/0000-0002-7074-0683","affiliations":[{"raw_affiliation_string":"Concordium Blockchain Research Center, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023850758","display_name":"S\u00f8ren Eller Thomsen","orcid":"https://orcid.org/0000-0002-6931-4740"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"S\u00f8ren Eller Thomsen","raw_affiliation_strings":["Concordium Blockchain Research Center, Aarhus University, Aarhus, Denmark"],"raw_orcid":"https://orcid.org/0000-0002-6931-4740","affiliations":[{"raw_affiliation_string":"Concordium Blockchain Research Center, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033255115"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":6.9368,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.97507025,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"400","last_page":"430"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8864796757698059},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.7046716213226318},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41937345266342163},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38597750663757324}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8864796757698059},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.7046716213226318},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41937345266342163},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38597750663757324},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-031-15979-4_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-15979-4_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:openaire/d3ff4f84-6db7-4b7b-83af-b4a0e95b19cc","is_oa":true,"landing_page_url":"https://pure.au.dk/portal/en/publications/d3ff4f84-6db7-4b7b-83af-b4a0e95b19cc","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Matt, C, Nielsen, J B & Thomsen, S E 2022 'Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks' Cryptology ePrint Archive. < https://eprint.iacr.org/2022/010 >","raw_type":"info:eu-repo/semantics/preprint"},{"id":"pmh:oai:pure.atira.dk:publications/cb530b90-9d18-47c3-a83d-532de2712782","is_oa":false,"landing_page_url":"https://pure.au.dk/portal/en/publications/cb530b90-9d18-47c3-a83d-532de2712782","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Matt, C, Nielsen, J B & Thomsen, S E 2022, Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks. in Advances in Cryptology \u2013 CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings : 42nd Annual International Cryptology Conference, CRYPTO 2022, Procerdings. Springer, Cham, Lecture Notes in Computer Science, no. 13508 , pp. 400-430, 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, United States, 15/08/2022. https://doi.org/10.1007/978-3-031-15979-4_14","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.atira.dk:publications/d3ff4f84-6db7-4b7b-83af-b4a0e95b19cc","is_oa":true,"landing_page_url":"https://eprint.iacr.org/2022/010","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/d3ff4f84-6db7-4b7b-83af-b4a0e95b19cc","is_oa":true,"landing_page_url":"https://pure.au.dk/portal/en/publications/d3ff4f84-6db7-4b7b-83af-b4a0e95b19cc","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Matt, C, Nielsen, J B & Thomsen, S E 2022 'Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks' Cryptology ePrint Archive. < https://eprint.iacr.org/2022/010 >","raw_type":"info:eu-repo/semantics/preprint"},"sustainable_development_goals":[{"score":0.8399999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W165274269","https://openalex.org/W390146837","https://openalex.org/W851575271","https://openalex.org/W1499934958","https://openalex.org/W1562226375","https://openalex.org/W2035527360","https://openalex.org/W2038562061","https://openalex.org/W2092867240","https://openalex.org/W2110396606","https://openalex.org/W2112603289","https://openalex.org/W2119245106","https://openalex.org/W2157004711","https://openalex.org/W2157504673","https://openalex.org/W2296427920","https://openalex.org/W2430991892","https://openalex.org/W2535104337","https://openalex.org/W2571698069","https://openalex.org/W2604903677","https://openalex.org/W2613387059","https://openalex.org/W2739845435","https://openalex.org/W2757888293","https://openalex.org/W2774909858","https://openalex.org/W2794533297","https://openalex.org/W2795222609","https://openalex.org/W2897676665","https://openalex.org/W2962882087","https://openalex.org/W2979777917","https://openalex.org/W2981621566","https://openalex.org/W3088537673","https://openalex.org/W3117321621","https://openalex.org/W3168667840"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Many":[0],"decentralized":[1],"systems":[2],"rely":[3],"on":[4,274,339,374],"flooding":[5,77,199,280,346,380],"protocols":[6,50,78,83,200],"for":[7,121,282,296],"message":[8,18,33,72,221],"dissemination.":[9],"In":[10],"such":[11,136],"a":[12,17,22,114,165,178,220,250,256,317,345,379],"protocol,":[13],"the":[14,32,45,66,71,111,151,187,195,214,228,232,236,246,264,275,279,287,294,328],"sender":[15,67],"of":[16,26,49,55,65,113,125,167,186,267,278,286,327],"sends":[19],"it":[20,96,216,230],"to":[21,34,86,99,101,119,130,142,176,218,225,234,244,255,334,365],"randomly":[23,36],"selected":[24,37],"set":[25],"peers.":[27],"These":[28],"peers":[29,64],"again":[30],"send":[31,219,333,364],"their":[35],"peers,":[38],"until":[39,180],"every":[40],"network":[41],"participant":[42],"has":[43],"received":[44],"message.":[46,237],"This":[47],"type":[48],"clearly":[51],"fail":[52],"in":[53,92,110,135,150,183,314],"face":[54],"an":[56,122,173,260],"adaptive":[57,247],"adversary":[58,174,254,320],"who":[59],"can":[60,158,322,343,377],"simply":[61],"corrupt":[62,160,177,323],"all":[63,331,362],"and":[68,311,360],"thereby":[69],"prevent":[70],"from":[73,171,222],"being":[74],"delivered.":[75],"Nevertheless,":[76],"are":[79,201],"commonly":[80],"used":[81],"within":[82],"that":[84,116,198,321],"aim":[85],"be":[87,128],"cryptographically":[88],"secure,":[89],"most":[90,307],"notably":[91],"blockchain":[93,115],"protocols.":[94],"While":[95],"is":[97,117,164,211],"possible":[98],"revert":[100],"static":[102,257],"corruptions,":[103],"this":[104,190,239],"gives":[105],"unsatisfactory":[106],"security":[107,133,297],"guarantees,":[108],"especially":[109],"setting":[112,248],"supposed":[118],"run":[120],"extended":[123],"period":[124],"time.":[126],"To":[127,238],"able":[129],"provide":[131,271],"meaningful":[132],"guarantees":[134],"settings,":[137],"we":[138,144,192,241,270,292,342,376],"give":[139],"precise":[140],"semantics":[141],"what":[143],"call":[145],"$$\\delta":[146,169,204,209,251],"$$":[147,170,205,210,252,300,309],"-delayed":[148,206,253],"adversaries":[149,157,207],"Universal":[152],"Composability":[153],"(UC)":[154],"framework.":[155],"Such":[156],"adaptively":[159],"parties,":[161],"but":[162],"there":[163],"delay":[166,305,350,384],"time":[168,215,229,277],"when":[172,208],"decides":[175],"party":[179],"they":[181],"succeed":[182],"overtaking":[184],"control":[185],"party.":[188],"Within":[189],"model,":[191],"formally":[193],"prove":[194],"intuitive":[196],"result":[197],"secure":[202],"against":[203],"at":[212,306],"least":[213],"takes":[217,231],"one":[223],"peer":[224],"another":[226],"plus":[227],"recipient":[233],"resend":[235],"end,":[240],"show":[242,293],"how":[243],"reduce":[245],"with":[249,259,304,316,348,382],"experiment":[258],"Erd\u0151s-R\u00e9nyi":[261,268],"graph.":[262],"Using":[263],"established":[265],"theory":[266],"graphs,":[269],"upper":[272],"bounds":[273],"propagation":[276],"functionality":[281,347,381],"different":[283],"neighborhood":[284],"sizes":[285],"gossip":[288],"network.":[289],"More":[290],"concretely,":[291],"following":[295],"parameter":[298],"$$\\kappa":[299],",":[301,310],"point-to-point":[302],"channels":[303],"$$\\varDelta":[308],"n":[312],"parties":[313,332,338,363,373],"total,":[315],"sufficiently":[318],"delayed":[319],"any":[324],"constant":[325],"fraction":[326],"parties:":[329],"If":[330],"$$\\varOmega":[335,366],"(\\kappa":[336],")$$":[337,358,372,387],"average,":[340,375],"then":[341],"realize":[344,378],"maximal":[349,383],"$$\\mathcal":[351,385],"{O}\\bigl":[352],"(\\varDelta":[353],"\\cdot":[354],"\\log":[355],"(n)":[356],"\\bigr":[357,371],";":[359],"if":[361],"\\bigl":[367],"(":[368],"\\sqrt{\\kappa":[369],"n}":[370],"{O}(\\varDelta":[386],".":[388]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
