Private Reputation Schemes for P2P Systems

Roslan Ismail, Colin Boyd, Audun Josang, Selwyn Russell


The risks from participating in P2P transactions are relatively high. To mitigate such risk a reputation scheme could be applied. Reputation schemes have emerged as a promising means for enabling electronic transactions with strangers. In order to gain optimal results from the reputation scheme, the privacy of feedback provider should be correctly addressed. The feedback provider should be allowed to leave a feedback without fear of retaliation. Unlike in centralized schemes, privacy seems impractical for P2P systems especially when accountability of feedback is also required. This paper considers how privacy can still be provided within the accountability requirement.


  1. Mihir Bellare, Juan A. Garay, and Tal Rabin. Fast batch veri¯cation for modular exponentiation and digital signatures. In K. Nyberg, editor, EUROCRYPT 7898, volume LNCS 1403, pages 236{250. Springer-Verlag Heidelberg, 1998.
  2. Stefan Brands. Untraceable o®-line cash in wallets with observers, In D. R. Stinson, editor, Advances in Cryptology - Crypto 7893, pages 302{318, Springer-Verlag, 1993.
  3. Fabrizio Cornelli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. Choosing Reputable Servents in a P2P Network. In Proceedings of the eleventh international conference on World Wide Web, pages 376{386. ACM Press, 2002.
  4. Ernesto Damiani, Sabrine De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, and Fabio Violante. A reputation-based approach for choosing reliable resources in Peer-to-Peer networks. In Proceedings of the 9th ACM conference on Computer and communications security, pages 207{216. ACM Press, 2002.
  5. D. Fahrenholtz and W. Lamersdorf. Transactional security for a distributed reputation management system. In K. Bauknecht, A. Min Tjoa, and G. Quirchmayr, editors, Proceedings of the 3rd International Conference on Electronic Commerce and Web Technologies, volume 2455 of Lecture Notes in Computer Science, pages 214{223. Springer-Verlag, 8 2002.
  6. Minaxi Gupta, Paul Judge, and Mostafa Ammar. A reputation system for Peer-toPeer networks. In ACM 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2003), pages 144{152. ACM Press, June 1-3 2003.
  7. Chu Yee Liau, Xuan Zhou, Stephane Bressan, and Kian-Lee Tan. E±cient distributed reputation scheme for Peer-to-Peer systems. In The 2nd International Human.Society@Internet Conference, volume LNCS 2713, pages 54{63. SpringerVerlag, 2003.
  8. Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, and Ed Dawson. Linkability in Practical Electronic Cash Design. In Proceedings of Information Security Workshop (ISW 2000), volume LNCS 1975, pages 149{163. Springer-Verlag, 2000.
  9. Ronald L. Rivest, Adi Shamir, and Yael Tauman. How to leak a secret. In C. Boyd, editor, ASIACRYPT 2001, volume LNCS 2248, pages 552{565. Springer-Verlag, 2001.

Paper Citation

in Harvard Style

Ismail R., Boyd C., Josang A. and Russell S. (2004). Private Reputation Schemes for P2P Systems . In Proceedings of the 2nd International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2004) ISBN 972-8865-07-4, pages 196-206. DOI: 10.5220/0002674201960206

in Bibtex Style

author={Roslan Ismail and Colin Boyd and Audun Josang and Selwyn Russell},
title={Private Reputation Schemes for P2P Systems},
booktitle={Proceedings of the 2nd International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2004)},

in EndNote Style

JO - Proceedings of the 2nd International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2004)
TI - Private Reputation Schemes for P2P Systems
SN - 972-8865-07-4
AU - Ismail R.
AU - Boyd C.
AU - Josang A.
AU - Russell S.
PY - 2004
SP - 196
EP - 206
DO - 10.5220/0002674201960206