Dynamic Decentralized Reputation System from Blockchain and Secure Multiparty Computation
نویسندگان
چکیده
In decentralized environments, such as mobile ad hoc networks (MANETs) and wireless sensor (WSNs), traditional reputation management systems are not viable due to their dependence on a central authority that is both accessible trustworthy for all participants. This particularly challenging in light of the dynamic nature these networks. To overcome limitations, our proposed solution utilizes blockchain technology maintain global information while remaining fully decentralized, secure multiparty computation ensure privacy. Our system limited specific settings, buyer/seller or provider/client scenarios, where only subset network raters others ratees. Instead, it allows nodes participate rating being rated. terms security, maintains feedback privacy semi-honest model, even presence up n−2 dishonest parties, requiring O(n) messages having an overhead. Furthermore, adopted techniques enable achieve unique characteristics accessibility, consistency, verifiability, supported by security analysis provided.
منابع مشابه
Fair and Efficient Secure Multiparty Computation with Reputation Systems
A reputation system for a set of entities is essentially a list of scores that provides a measure of the reliability of each entity in the set. The score given to an entity can be interpreted (and in the reputation system literature it often is [12]) as the probability that an entity will behave honestly. In this paper, we ask whether or not it is possible to utilize reputation systems for carr...
متن کاملSecure Multiparty Computation from SGX
Isolated Execution Environments (IEE) offered by novel commodity hardware such as Intel’s SGX deployed in Skylake processors permit executing software in a protected environment that shields it from a malicious operating system; it also permits a remote user to obtain strong interactive attestation guarantees on both the code running in an IEE and its input/output behaviour. In this paper we sh...
متن کاملSecure Multiparty Computation
A function is private if there exists a protocol that is secure; that is, no party can learn any additional information about the other parties’ inputs other than what follows from their own input and the function’s output. Previous studies have investigated multiparty computation with broadcast communication, but broadcast communication does not fully capture all secure multiparty protocols. W...
متن کاملBlockchain Multiparty Computation Markets at Scale
We explore ways of allowing for the offloading of computationally rigorous tasks from devices with slow logical processors onto a network of anonymous peer-processors. Recent advances in secret sharing schemes, decentralized consensus mechanisms, and multiparty computation (MPC) protocols are combined to create a P2P MPC market. Unlike other computational ”clouds”, ours is able to generically c...
متن کاملSecure Multiparty Computation
Assume a number of parties want to compute a public function F (x1, . . . , xn) = (y1, . . . , yn). All of them want to get the correct answer, but none of them are willing to expose their secret inputs to other parties. One way to achieve this requirement is to implement the secure multiparty computation protocols. In this paper, we will make a brief introduction to secure multiparty computati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Sensor and Actuator Networks
سال: 2023
ISSN: ['2224-2708']
DOI: https://doi.org/10.3390/jsan12010014