4.7 Article

Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey

期刊

ACM COMPUTING SURVEYS
卷 55, 期 2, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3490236

关键词

Anonymity; blockchain; computational trust; privacy; reputation; trustlessness

向作者/读者索取更多资源

The purpose of a reputation system is to hold users accountable for their behavior in a distributed application. Users' reputation is computed based on the feedback provided by fellow users. Privacy-preserving reputation systems allow users to provide feedback privately. This survey proposes analysis frameworks for privacy-preserving reputation systems, focusing on blockchain-based systems and their unique properties. The analysis provides insights and directions for further research, including leveraging blockchain for truly trustless systems and addressing common attacks.
The purpose of a reputation system is to hold the users of a distributed application accountable for their behavior. The reputation of a user is computed as an aggregate of the feedback provided by fellow users in the system. Truthful feedback is clearly a prerequisite for computing a reputation score that accurately represents the behavior of a user. However, it has been observed that users can hesitate in providing truthful feedback because, for example, of fear of retaliation. Privacy-preserving reputation systems enable users to provide feedback in a private and thus uninhibited manner. In this survey, we propose analysis frameworks for privacy-preserving reputation systems. We use these analysis frameworks to reviewand compare the existing approaches. Emphasis is placed on blockchain-based systems as they are a recent significant development in the area. Blockchain-based privacy-preserving reputation systems have properties, such as trustlessness, transparency, and immutability, which prior systems do not have. Our analysis provides several insights and directions for future research. These include leveraging blockchain to its full potential in order to develop truly trustless systems, to achieve some important security properties, and to include defenses against common attacks that have so far not been addressed by most current systems.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据