
providers while submitting a feedback. With this property the feedback providers
can leave negative feedback without fear of retaliation from the other parties.
The token based solution is suitable to provide a simple privacy protection and
furthermore it is efficient in terms of computation required to verify signatures.
References
1. Mihir Bellare, Juan A. Garay, and Tal Rabin. Fast batch verification for modular
exp onentiation and digital signatures. In K. Nyberg, editor, EUROCRYPT ’98 ,
volume LNCS 1403, pages 236–250. Springer-Verlag Heidelberg, 1998.
2.
Stefan Brands. Untraceable off-line cash in wallets with observers, In D. R. Stinson,
editor, Advances in Cryptology - Crypto ’93, pages 302–318, Springer-Verlag, 1993.
3. Fabrizio Cornelli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Para-
b oschi, and Pierangela Samarati. Choosing Reputable Servents in a P2P Network.
In Proceedings of the eleventh international conference on World Wide Web, pages
376–386. ACM Press, 2002.
4.
Ernesto Damiani, Sabrine De Capitani di Vimercati, Stefano Paraboschi, Pierangela
Samarati, and Fabio Violante. A reputation-based approach for choosing reliable
resources in Peer-to-Peer networks. In Proceedings of the 9th ACM conference on
Computer and communications security, pages 207–216. ACM Press, 2002.
5. D. Fahrenholtz and W. Lamersdorf. Transactional security for a distributed repu-
tation management system. In K. Bauknecht, A. Min Tjoa, and G. Quirchmayr,
editors, Proceedings of the 3rd International Conference on Electronic Commerce
and Web Technologies, volume 2455 of Lecture Notes in Computer Science, pages
214–223. Springer-Verlag, 8 2002.
6.
Minaxi Gupta, Paul Judge, and Mostafa Ammar. A reputation system for Peer-to-
Peer networks. In ACM 13th International Workshop on Network and Operating
Systems Support for Digital Audio and Video (NOSSDAV 2003), pages 144–152.
ACM Press, June 1-3 2003.
7.
Chu Yee Liau, Xuan Zhou, Stephane Bressan, and Kian-Lee Tan. Efficient dis-
tributed reputation scheme for Peer-to-Peer systems. In The 2nd International
Human.Society@Internet Conference, volume LNCS 2713, pages 54–63. Springer-
Verlag, 2003.
8. Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, and Ed Dawson. Linkability in
Practical Electronic Cash Design. In Proceedings of Information Security Workshop
(ISW 2000) , volume LNCS 1975, pages 149–163. Springer-Verlag, 2000.
9.
Ronald L. Rivest, Adi Shamir, and Yael Tauman. How to leak a secret. In C. Boyd,
editor, ASIACRYPT 2001, volume LNCS 2248, pages 552–565. Springer-Verlag,
2001.
205