Computer Science ›› 2013, Vol. 40 ›› Issue (Z6): 334-336.

Previous Articles     Next Articles

Privacy Preserving Reputation Protocol for P2P Environment

SUN Bo,DING Xue-feng,SI Cheng-xiang and ZHANG Wei   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Reputation protocol is used to compute feedback by summing up the individual reputations of other system users.The feedback is then used to make a decision.It is always the case that the entities in a reputation system will provide dishonest feedback due to fear of exposing their privacy which would lead to retaliatory acts from opponents.In this paper,a privacy preserving reputation protocol enable an entity to acquire fair reputation from other entities.In this protocol Shamir Secret Sharing and Verifiable Secret Sharing with homomorphic property are employed to enable the dealer and secret holders to verify the correctness of the shared secret.Moreover a random selection of the participating secret holders is achieved.And using the shared secret key,the secret reputation feedback is attained by decryption.Further more,the nice privacy preserving properties of the semantically secure ElGamal and Cramer Shoup Cryptosystem are used to enable the secret holders to submit their secret reputation feedback in a privacy preserving way and securely access a database of current reputation feedback maintained by a reputation engine.

Key words: ElGamal cryptosystem,Cramer-Shoup cryptosystem,Shamir threhold secret sharing,Homomorphic encryption,Reputation system

[1] Kamvar S D,Schlosser M T,GarciaMolina H.The enginetrust algorithm for reputation manegement in P2P networks[C]∥Proc.of 12th Intl.Conf.on World Wide Web(WWW2003).New york:Springer-Verlag,2003:344-51
[2] Xiong L,Liu L.Supporting reputation-based trust in peer-tp-peer communities[J].IEEE transaction on knowledge and data engineering,2004,12(7):843-857
[3] Pederson T.Non-interactive and information secure verifiablesecret sharing[C]∥Proc.of Advances in Cryptology-Crypto’91.New york:Springer-Verlag,1991:129-140
[4] Resnick P,Zeckhauser R.Trust among strangers in internettransactions[J].The economics of the internet and e-commerce,2002,11:127-157
[5] Shamir A.How to share a secret[C]∥Communications of ACM 22,1979.New york:Springer-Verlag,1979:612-613
[6] Chor B,Goldwasser S,Micali S,et al.verifiable secret sharingandachieving simultaneity in the presence of faults[C]∥Proc.of the 26th Annual symposium on foundation of computer science,1985.New york:Springer-Verlag,1985:383-395
[7] Mao Wen-bo.Modern cryptography:Theory and Practice[M].Prentice Hall PTR,2003:514-590

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!