Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes
Research output: Contribution to journal › Article › Scientific › peer-review
Details
Original language | English |
---|---|
Pages (from-to) | 559-575 |
Number of pages | 17 |
Journal | WIRELESS PERSONAL COMMUNICATIONS |
Volume | 66 |
Issue number | 3 |
Publication status | Published - 2012 |
Externally published | Yes |
Publication type | A1 Journal article-refereed |
Abstract
In this paper, we focus on attacks and defense mechanisms in additive reputation systems. We start by surveying the most important protocols that aim to provide privacy between individual voters. Then, we categorize attacks against additive reputation systems considering both malicious querying nodes and malicious reporting nodes that collaborate in order to undermine the vote privacy of the remaining users. To the best of our knowledge this is the first work that provides a description of such malicious behavior under both semi-honest and malicious model. In light of this analysis we demonstrate the inefficiencies of existing protocols.
Keywords
- Decentralized reputation systems, Security, Voter privacy