Skip to main content

Supporting Privacy in Decentralized Additive Reputation Systems

  • Conference paper
Trust Management (iTrust 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2995))

Included in the following conference series:

Abstract

Previous studies have been suggestive of the fact that reputation ratings may be provided in a strategic manner for reasons of reciprocation and retaliation, and therefore may not properly reflect the trustworthiness of rated parties. It thus appears that supporting privacy of feedback providers could improve the quality of their ratings. We argue that supporting perfect privacy in decentralized reputation systems is impossible, but as an alternative present three probabilistic schemes that support partial privacy. On the basis of these schemes, we offer three protocols that allow ratings to be privately provided with high probability in decentralized additive reputation systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. eBay auction site (2003), http://www.ebay.com

  2. Yu, B., Singh, M.: Distributed reputation management for electronic commerce. Computational Intelligence 18, 535–549 (2002)

    Article  MathSciNet  Google Scholar 

  3. Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: Empirical analysis of ebay’s reputation system. In: Working paper for the NBER Workshop on Emprical Studies of Electronic Commerce (2000)

    Google Scholar 

  4. Josang, A., Ismail, R.: The beta reputation system. In: The Proceedings of the 15th Bled Conference on Electronic Commerce, Bled, Slovenia (2002)

    Google Scholar 

  5. Saks, M.: A robust noncryptographic protocol for collective coin flipping. SIAM Journal on Discrete Mathematics 2, 240–244 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  6. Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)

    MATH  Google Scholar 

  7. Pederson, T.: Non-interactive and information secure veriable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)

    Google Scholar 

  8. Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  9. Cramer, R., Franklin, M., Yung, L.S., Multi-authority, M.: Secret ballot elections with linear work. Technical Report CS-R9571, Centrum voor Wiskunde en Informatica (1995)

    Google Scholar 

  10. Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proceedings of 9th International Conference on Information and Knowledge Management, Atlanta (2001)

    Google Scholar 

  11. Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, Maui, Hawaii (2000)

    Google Scholar 

  12. Kinateder, M., Rothermel, K.: Architecture and algorithms for a distributed reputation system. In: Proceedings of the First International Conference on Trust Management, Crete, Greece (2003)

    Google Scholar 

  13. Yu, B., Singh, M.: Detecting deception in reputation management. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multi-Agent Systems, pp. 73–80 (2003)

    Google Scholar 

  14. Dellarocas, C.: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proceedings of the 2nd ACM Conference on Electronic Commerce, Minneapolis, MN (2000)

    Google Scholar 

  15. Ismail, R., Boyd, C., Josang, A., Russel, S.: Strong privacy in reputation systems (preliminary version). In: The proceedings of WISA 2003 (2003)

    Google Scholar 

  16. Ismail, R., Boyd, C., Josang, A., Russel, S.: A security architecture for reputation systems. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2003. LNCS, vol. 2738, Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Kinateder, M., Pearson, S.: A privacy-enhanced peer-to-peer reputation system. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2003. LNCS, vol. 2738, Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  18. tcpa homepage: http://www.trustedcomputing.org (2003)

  19. againsttcpa homepage: http://www.againsttcpa.com (2003)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pavlov, E., Rosenschein, J.S., Topol, Z. (2004). Supporting Privacy in Decentralized Additive Reputation Systems. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds) Trust Management. iTrust 2004. Lecture Notes in Computer Science, vol 2995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24747-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24747-0_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21312-3

  • Online ISBN: 978-3-540-24747-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics