2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS) 2016
DOI: 10.1109/icdcs.2016.34
|View full text |Cite
|
Sign up to set email alerts
|

PAG: Private and Accountable Gossip

Abstract: Abstract-A large variety of content sharing applications rely, at least partially, on gossip-based dissemination protocols. However, these protocols are subject to various types of faults, among which selfish behaviours performed by nodes that benefit from the system without contributing their fair share to it. Accountability mechanisms (e.g., PeerReview, AVMs, FullReview), which require that nodes log their interactions with others and periodically inspect each others' logs are effective solutions to deter fa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(20 citation statements)
references
References 27 publications
0
20
0
Order By: Relevance
“…The duck attack is named after the duck test 1 and it can be summarized as follows: if you provide me the cryptographic digest H (m) of a message m, then it probably means that you know H (m) and the message m. Note that, this is outrightly false because concluding that you know m from the fact that you know H (m) is incorrect. We find this logical flaw in PAG [DMPQ16] and AcTinG [MDQ14a]. In a duck attack, the colluding nodes execute the protocol without exchanging the messages.…”
Section: Contributionsmentioning
confidence: 92%
See 4 more Smart Citations
“…The duck attack is named after the duck test 1 and it can be summarized as follows: if you provide me the cryptographic digest H (m) of a message m, then it probably means that you know H (m) and the message m. Note that, this is outrightly false because concluding that you know m from the fact that you know H (m) is incorrect. We find this logical flaw in PAG [DMPQ16] and AcTinG [MDQ14a]. In a duck attack, the colluding nodes execute the protocol without exchanging the messages.…”
Section: Contributionsmentioning
confidence: 92%
“…In Section 2, we discuss the threat model and colluding adversaries. We first demonstrate the power of the duck attack on PAG [DMPQ16] (Section 3). In Section 4, we also illustrate the duck attack on AcTinG a protocol which inherits the secure log system of PeerReview [HKD07].…”
Section: Contributionsmentioning
confidence: 99%
See 3 more Smart Citations