Skip to main content

An Anonymous Reputation System with Reputation Secrecy for Manager

  • Conference paper
  • First Online:
Information Security and Cryptology -- ICISC 2013 (ICISC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8565))

Included in the following conference series:

Abstract

In anonymous reputation systems, where after an interaction between anonymous users, one of the user evaluates the peer by giving a rating. Ratings for a user are accumulated, which becomes the reputation of the user. By using the reputation, we can know the reliability of an anonymous user. Previously, anonymous reputation systems have been proposed, using an anonymous e-cash scheme. However, in the e-cash-based systems, the bank grasps the accumulated reputations for all users, and the fluctuation of reputations. These are private information for users. Furthermore, the timing attack using the deposit times is possible, which makes the anonymity weak. In this paper, we propose an anonymous reputation system, where the reputations of users are secret for even the reputation manager such as the bank. Our approach is to adopt an anonymous credential certifying the accumulated reputation of a user. Initially a user registers with the reputation manager, and is issued an initial certificate. After each interaction with a rater, the user as the ratee obtains an updated certificate certifying the previous reputation summed up by the current rating. The update protocol is based on the zero-knowledge proofs, and thus the reputations are secret for the reputation manager. On the other hand, due to the certificate, the user cannot maliciously alter his reputation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure-preserving signatures and commitments to group elements. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 209–236. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  2. Abe, M., Haralambiev, K., Ohkubo, M.: Signing on elements in bilinear groups for modular protocol design. Cryptology ePrint Archive, Report 2010/133 (2010). http://eprint.iacr.org/

  3. Androulaki, E., Choi, S.G., Bellovin, S.M., Malkin, T.: Reputation systems for anonymous networks. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 202–218. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108–125. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  5. Bethencourt, J., Shi, E., Song, D.: Signatures of reputation. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 400–407. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Camenisch, J.L., Chaabouni, R., Shelat, A.: Efficient protocols for set membership and range proofs. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 234–252. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Camenisch, J., Kiayias, A., Yung, M.: On the portability of generalized schnorr proofs. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 425–442. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 481–500. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. J. Cryptol. 1(1), 65–75 (1988)

    MathSciNet  MATH  Google Scholar 

  11. Schiffner, S., Clauß, S., Steinbrecher, S.: Privacy and liveliness for reputation systems. In: Martinelli, F., Preneel, B. (eds.) EuroPKI 2009. LNCS, vol. 6391, pp. 209–224. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. Schiffner, S., Clauß, S., Steinbrecher, S.: Privacy, liveliness and fairness for reputation. In: Černá, I., Gyimóthy, T., Hromkovič, J., Jefferey, K., Králović, R., Vukolić, M., Wolf, S. (eds.) SOFSEM 2011. LNCS, vol. 6543, pp. 506–519. Springer, Heidelberg (2011)

    Google Scholar 

  13. Sudarsono, A., Nakanishi, T., Funabiki, N.: Efficient proofs of attributes in pairing-based anonymous credential system. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 246–263. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Toru Nakanishi .

Editor information

Editors and Affiliations

A Syntax and Security Requirements

A Syntax and Security Requirements

1.1 A.1 Syntax

The algorithms and protocol of the anonymous reputation system are as follows.

  • Setup( \(\mathsf {l}, n, L, \tilde{L}\)): This is the key setup algorithm for \(\mathsf {RM}\). In the inputs, \(\mathsf {l}\) is the security parameter, \(n\) is the maximum number of items which are offered by sellers but have not been rated yet, and \(L\) is the number of ranges used in proving for the accumulated reputation. \(\tilde{L}\) is the number of ranges used in proving for the number of ratings. This algorithm outputs \(\mathsf {RM}\)’s public key \(rpk\), \(\mathsf {RM}\)’s secret key \(rsk\), and initialize sets \(\mathcal{L}_{\mathsf {RM}}\), \(\mathcal{P}\) and \(\mathcal{S}\) as empty.

  • Register: This is an interactive protocol between a joining user \(\mathsf {U}\) and \(\mathsf {RM}\) for the registration of \(\mathsf {U}\). The common input is \(rpk\). The input of \(\mathsf {RM}\) is \(rsk\). The outputs of \(\mathsf {U}\) are \(\mathsf {U}\)’s unique secret \(sec\) and an initial one-time certificate \(cert_0\) indicating accumulated reputation \(rep_0=0\) and the number of ratings \(num_0=0\).

  • Show: This is an interactive protocol between a seller (registered user) \(\mathsf {U}\) and \(\mathsf {RM}\), where \(\mathsf {U}\) proves that his/her current reputation \(rep_{t-1}\) lies in range \([2^{\ell -1},2^\ell -1]\), and proves that the number of ratings \(num_{t-1}\) lies in range \([2^{\tilde{\ell }-1},2^{\tilde{\ell }}-1]\). The common input is \(rpk\). The inputs of \(\mathsf {U}\) are \(rep_{t-1}, num_{t-1}\), the user’s secret \(sec\), and the certificate \(cert_{t-1}\). The inputs of \(\mathsf {RM}\) are \(rsk\), \(\mathcal{L}_{\mathsf {RM}}\), and \(\mathcal{S}\). The outputs of \(\mathsf {U}\) are item ID number \(i\) and an updated one-time certificate \(cert_t\) for \(i\), and \(rep_t = rep_{t-1}\), \(num_t = num_{t-1}\). The outputs of \({\mathsf {RM}}\) are updated \(\mathcal{L}_{\mathsf {RM}}\), and \(\mathcal{S}\). The set \(\mathcal{L}_{\mathsf {RM}} \subset [1,n]\) consists of ID numbers of items which are offered by sellers but have not been rated yet. The set \(\mathcal{S}\) consists of tags which are included in certificates, to detect the double use of the certificates. If the certificate \(cert_{t-1}\) has been used in a past protocol, this protocol is aborted.

  • Rate: This is the algorithm of \(\mathsf {RM}\) that, on inputs item ID number \(i\), the rating value \(\varDelta _{rep}\), the pending database \(\mathcal{P}\) and \(\mathcal{L}_{\mathsf {RM}}\), deletes \(i\) from \(\mathcal{L}_{\mathsf {RM}}\) and adds \((i, \varDelta _{rep})\) to \(\mathcal{P}\). The set \(\mathcal{P}\) consists of \((i,\varDelta _{rep})\) such that the rating \(\varDelta _{rep}\) has not been accumulated to the corresponding certificate yet.

  • Update: This is an interactive protocol between a seller \(\mathsf {U}\) and \(\mathsf {RM}\) to accumulate the rating in the certificate. The common inputs are \(rpk\), the target item ID number \(i\), and the rating \(\varDelta _{rep}\). The inputs of \(\mathsf {U}\) are \(rep_{t-1}, num_{t-1}\), the user’s secret \(sec\), and the certificate \(cert_{t-1}\). The inputs of \(\mathsf {RM}\) are \(rsk\), \(\mathcal{P}\), \(\mathcal{L}_{\mathsf {RM}}\), and \(\mathcal{S}\). The outputs of \(\mathsf {U}\) are \(rep_t = rep_{t-1}+\varDelta _{rep}\), \(num_t = num_{t-1}+1\), and the one-time certificate \(cert_t\). \(\mathsf {RM}\) deletes \((i,\varDelta _{rep})\) from \(\mathcal{P}\). If the certificate \(cert_{t-1}\) has been used in a past protocol, this protocol is aborted.

Using the above algorithms and protocols, the system flow is as follows. First of all, \(\mathsf {RM}\) initializes the system using Setup, where the public key \(rpk\) is published. When a user wants to participate in this system, the user registers with \(\mathsf {RM}\) to obtain initial data. When a user wants to offer an item, the user registers his item and conducts Show protocol with \(\mathsf {RM}\). \(\mathsf {RM}\) publishes the item with the ranges of \(rep_{t-1}, num_{t-1}\) of the seller, where buyers can check the reliability of the seller. After a buyer has an interaction with the seller, the buyer sends his rating to \(\mathsf {RM}\). \(\mathsf {RM}\) forwards the rating to the seller, who conducts \(\mathbf{Update}\) protocol with \(\mathsf {RM}\).

1.2 A.2 Security Requirements

As the security, we consider the reputation unforgeability and the seller anonymity.

Reputation Unforgeability. Consider the following reputation unforgeability game. As the proof in [4], in order to identify the user from the Update or Show protocol transcript, we need a special algorithm, Extract.

Reputation unforgeability game: The challenger runs Setup, and obtains \(rpk\) and \(rsk\). He provides \(\mathcal{A}\) with \(rpk\), and run \(\mathcal{A}\). He initializes the database \(\mathcal{D}\) with entries \((x_{\mathsf {i}}, \mathsf {sum}_{{\mathsf {i}}, rep}, \mathsf {sum}_{{\mathsf {i}}, num})\). In the run, \(\mathcal{A}\) can query the challenger about the following queries:

  • C-Register: To \(\mathcal{A}\)’s request, the challenger as \({\mathsf {RM}}\) executes Register protocol with \(\mathcal{A}\) as a user.

  • C-Show: To \(\mathcal{A}\)’s request as the seller, the challenger as \({\mathsf {RM}}\) executes Show protocol with \(\mathcal{A}\).

  • C-Update: To \(\mathcal{A}\)’s request for the item ID \(i\) and the rating \(\varDelta _{rep}\), using Rate, the challenger updates \(\mathcal{P}\) and \(\mathcal{L}_{\mathsf {RM}}\). Then, the challenger as \({\mathsf {RM}}\) executes Show protocol on input \((i, \varDelta _{rep})\) with \(\mathcal{A}\) as the seller. From the protocol transcript, using Extract, the challenger extracts the identity \(x_{\mathsf {i}}\) of the user. In the database \(\mathcal{D}\), the challenger renews \({\mathsf {sum}}_{{\mathsf {i}},rep} = {\mathsf {sum}}_{{\mathsf {i}},rep} + \varDelta _{rep}\), and \({\mathsf {sum}}_{{\mathsf {i}},num} = {\mathsf {sum}}_{{\mathsf {i}},num} + 1\) in the entry \((x_{\mathsf {i}}, \mathsf {sum}_{{\mathsf {i}}, rep}, \mathsf {sum}_{{\mathsf {i}}, num})\).

Finally, the challenger as \({\mathsf {RM}}\) executes Show protocol with \(\mathcal{A}\) as a seller.

Then, \(\mathcal{A}\) wins if

  1. 1.

    The final Show protocol succeeds for \(rep^*_{t-1}\in [2^{\ell -1},2^{\ell }-1]\) and \(num^*_{t-1}\in [2^{\tilde{\ell }-1},2^{\tilde{\ell }}-1]\) for some \(\ell , \tilde{\ell }\).

  2. 2.

    For \(x_\mathsf {i^*}\) extracted by Extract from the final Show protocol, it holds that \(\mathsf {sum}_{{\mathsf {i}^*}, rep}\notin [2^{\ell -1},2^{\ell }-1]\) or \(\mathsf {sum}_{{\mathsf {i}^*}, num}\notin [2^{\tilde{\ell }-1},2^{\tilde{\ell }}-1]\) in the entry \((x_{\mathsf {i^*}}, \mathsf {sum}_{{\mathsf {i}^*}, rep}, \mathsf {sum}_{{\mathsf {i}^*}, num})\) in \(\mathcal{D}\).

Definition 4

A reputation system is reputation unforgeable if, for any PPT adversary \(\mathcal{A}\) involved in the reputation unforgeability game, the probability that \(\mathcal{A}\) wins the game is negligible for security parameter \(\mathsf {l}\).

Seller Anonymity. As the syntax shows, the pair of Show protocol and Update protocol for the same item ID are linkable and the rating \(\varDelta _{rep}\) is revealed. Furthermore, each Show protocol reveals the ranges which \(rep\) and \(num\) lie in. The seller anonymity means that any adversary can obtain no information on the user beyond these. Since the adversary can corrupt \({\mathsf {RM}}\), the system with the seller anonymity satisfies the reputation secrecy for even the manager. In the similar way to the anonymity definition of an anonymous credential system [4], the seller anonymity is defined as follows: The interaction of the adversary (corrupting \({\mathsf {RM}}\)) with honest users is indistinguishable from some ideal game where Show and Update protocol transcripts are independent of the user’s identity. Consider the simulators, SimShow, SimUpdate for Show, Update.

Definition 5

A reputation system is seller anonymous if the following properties hold:

  • No adversary can tell if it is interacting with an honest user with \(rep_{t-1}\), \(num_{t-1}, sec, cert_{t-1}\) in \(\mathbf{Show}\) protocol, or with SimShow which is not given \(rep_{t-1}, num_{t-1}, sec, cert_{t-1}\).

  • No adversary can tell if it is interacting with an honest user with \(rep_{t-1}\), \(num_{t-1}, sec, cert_{t-1}\) in \(\mathbf{Update}\) protocol, or with SimUpdate which is not given \(rep_{t-1}, num_{t-1}, sec, cert_{t-1}\).

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Nakanishi, T., Nomura, T., Funabiki, N. (2014). An Anonymous Reputation System with Reputation Secrecy for Manager. In: Lee, HS., Han, DG. (eds) Information Security and Cryptology -- ICISC 2013. ICISC 2013. Lecture Notes in Computer Science(), vol 8565. Springer, Cham. https://doi.org/10.1007/978-3-319-12160-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12160-4_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12159-8

  • Online ISBN: 978-3-319-12160-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics