{"id":"https://openalex.org/W4308409811","doi":"https://doi.org/10.1145/3548606.3560638","title":"The Generals' Scuttlebutt","display_name":"The Generals' Scuttlebutt","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308409811","doi":"https://doi.org/10.1145/3548606.3560638"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3560638","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3560638","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3560638","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3560638","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063984924","display_name":"Sandro Coretti","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sandro Coretti","raw_affiliation_strings":["IOG, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"IOG, Zurich, Switzerland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073753740","display_name":"Aggelos Kiayias","orcid":"https://orcid.org/0000-0003-2451-1430"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Aggelos Kiayias","raw_affiliation_strings":["University of Edinburgh &amp; IOG, Edinburgh, Scotland Uk"],"affiliations":[{"raw_affiliation_string":"University of Edinburgh &amp; IOG, Edinburgh, Scotland Uk","institution_ids":["https://openalex.org/I98677209"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008033989","display_name":"Cristopher Moore","orcid":"https://orcid.org/0000-0002-2062-1942"},"institutions":[{"id":"https://openalex.org/I1308548392","display_name":"Santa Fe Institute","ror":"https://ror.org/01arysc35","country_code":"US","type":"funder","lineage":["https://openalex.org/I1308548392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cristopher Moore","raw_affiliation_strings":["Santa Fe Institute, Santa Fe, NM, USA"],"affiliations":[{"raw_affiliation_string":"Santa Fe Institute, Santa Fe, NM, USA","institution_ids":["https://openalex.org/I1308548392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088846595","display_name":"Alexander Russell","orcid":"https://orcid.org/0000-0002-8228-6238"},"institutions":[{"id":"https://openalex.org/I140172145","display_name":"University of Connecticut","ror":"https://ror.org/02der9h97","country_code":"US","type":"education","lineage":["https://openalex.org/I140172145"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alexander Russell","raw_affiliation_strings":["University of Connecticut &amp; IOG, Storrs, CT, USA"],"affiliations":[{"raw_affiliation_string":"University of Connecticut &amp; IOG, Storrs, CT, USA","institution_ids":["https://openalex.org/I140172145"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063984924"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.0871,"has_fulltext":true,"cited_by_count":23,"citation_normalized_percentile":{"value":0.89311076,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"595","last_page":"608"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8320462703704834},{"id":"https://openalex.org/keywords/gossip","display_name":"Gossip","score":0.8247007131576538},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6674286127090454},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.6006505489349365},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5208783149719238},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4658805727958679},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.4450386166572571},{"id":"https://openalex.org/keywords/idealization","display_name":"Idealization","score":0.44233232736587524},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.4390127658843994},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4235169291496277},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.292270302772522},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2045992612838745},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.12036284804344177},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.08984273672103882},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.07551631331443787}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8320462703704834},{"id":"https://openalex.org/C62989814","wikidata":"https://www.wikidata.org/wiki/Q854648","display_name":"Gossip","level":2,"score":0.8247007131576538},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6674286127090454},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.6006505489349365},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5208783149719238},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4658805727958679},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.4450386166572571},{"id":"https://openalex.org/C2780986378","wikidata":"https://www.wikidata.org/wiki/Q776634","display_name":"Idealization","level":2,"score":0.44233232736587524},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.4390127658843994},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4235169291496277},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.292270302772522},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2045992612838745},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.12036284804344177},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.08984273672103882},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.07551631331443787},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3548606.3560638","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3560638","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3560638","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.ed.ac.uk:openaire/264e8af3-3776-4eb0-8226-db3179d7b3d3","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/264e8af3-3776-4eb0-8226-db3179d7b3d3","pdf_url":null,"source":{"id":"https://openalex.org/S4406922455","display_name":"Edinburgh Research Explorer","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Coretti, S, Kiayias, A, Russell, A & Moore, C 2022, The Generals\u2019 Scuttlebutt: Byzantine-Resilient Gossip Protocols. in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), pp. 595-608, The 29th ACM Conference on Computer and Communications Security, Los Angeles, California, United States, 7/11/22. https://doi.org/10.1145/3548606.3560638","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:pure.ed.ac.uk:publications/264e8af3-3776-4eb0-8226-db3179d7b3d3","is_oa":true,"landing_page_url":"https://dl.acm.org/doi/10.1145/3548606.3560638","pdf_url":null,"source":{"id":"https://openalex.org/S4306400321","display_name":"Edinburgh Research Explorer (University of Edinburgh)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98677209","host_organization_name":"University of Edinburgh","host_organization_lineage":["https://openalex.org/I98677209"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"doi:10.1145/3548606.3560638","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3560638","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3560638","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6899999976158142}],"awards":[{"id":"https://openalex.org/G26546545","display_name":"SaTC: CORE: Medium: Collaborative: Theory and Practice of Cryptosystems Secure Against Subversion","funder_award_id":"1801487","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7630799912","display_name":null,"funder_award_id":"1801487,1838251","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8437291228","display_name":null,"funder_award_id":"1838251","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4308409811.pdf","grobid_xml":"https://content.openalex.org/works/W4308409811.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W1499934958","https://openalex.org/W1964678106","https://openalex.org/W1965475550","https://openalex.org/W1971817342","https://openalex.org/W2038562061","https://openalex.org/W2157504673","https://openalex.org/W2611050176","https://openalex.org/W2914554654","https://openalex.org/W2962882087","https://openalex.org/W2981621566","https://openalex.org/W3097679450","https://openalex.org/W3137092842","https://openalex.org/W4248175462","https://openalex.org/W4308409811"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W4386850441","https://openalex.org/W3211706803","https://openalex.org/W2479311294","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W2094020986","https://openalex.org/W2028973390"],"abstract_inverted_index":{"One":[0],"of":[1,6,14,25,47,63,70,82,112],"the":[2,12,23,40,45,52,67,93,105],"most":[3],"successful":[4],"applications":[5],"peer-to-peer":[7],"communication":[8,95],"networks":[9,73],"is":[10],"in":[11,39,98],"context":[13],"blockchain":[15,76],"protocols,":[16,49],"which-in":[17],"Satoshi":[18],"Nakamoto's":[19],"own":[20],"words-rely":[21],"on":[22,79],"\"nature":[24],"information":[26],"being":[27],"easy":[28],"to":[29,33],"spread":[30],"and":[31,50,104],"hard":[32],"stifle.\"":[34],"Significant":[35],"efforts":[36],"were":[37],"invested":[38],"last":[41],"decade":[42],"into":[43],"analyzing":[44],"security":[46,53,100],"these":[48],"invariably":[51],"arguments":[54,101],"known":[55],"for":[56,102],"longest-chain":[57],"Nakamoto-style":[58],"consensus":[59],"use":[60],"an":[61],"idealization":[62],"this":[64],"tenet.":[65],"Unfortunately,":[66],"real-world":[68],"implementations":[69],"peer-topeer":[71],"gossip-style":[72],"used":[74],"by":[75],"protocols":[77],"rely":[78],"a":[80,89,109],"number":[81],"ad-hoc":[83],"attack":[84],"mitigation":[85],"strategies":[86],"that":[87],"leave":[88],"glaring":[90],"gap":[91],"between":[92],"idealized":[94],"layer":[96],"assumed":[97],"formal":[99],"blockchains":[103],"real":[106],"world,":[107],"where":[108],"wide":[110],"array":[111],"attacks":[113],"have":[114],"been":[115],"showcased.":[116]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
