Communications of the ACM
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
FPGA '02 Proceedings of the 2002 ACM/SIGDA tenth international symposium on Field-programmable gate arrays
Experiences Deploying a Large-Scale Emergent Network
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Incentives for Sharing in Peer-to-Peer Networks
WELCOM '01 Proceedings of the Second International Workshop on Electronic Commerce
Mariposa: a wide-area distributed database system
The VLDB Journal — The International Journal on Very Large Data Bases
Identity Crisis: Anonymity vs. Reputation in P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Self-recharging virtual currency
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Influences on cooperation in BitTorrent communities
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
FOCS '05 Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science
Efficiency and nash equilibria in a scrip system for P2P networks
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
Taxonomy of trust: categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Mirage: a microeconomic resource allocation system for sensornet testbeds
EmNets '05 Proceedings of the 2nd IEEE workshop on Embedded Networked Sensors
Clustering and sharing incentives in BitTorrent systems
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Distributed quota enforcement for spam control
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Ripping coins for a fair exchange
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Fileteller: paying and getting paid for file storage
FC'02 Proceedings of the 6th international conference on Financial cryptography
Do incentives build robustness in bit torrent
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Ensuring content integrity for untrusted peer-to-peer content distribution networks
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Building reliable mix networks with fair exchange
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Incentivizing outsourced computation
Proceedings of the 3rd international workshop on Economics of networked systems
Reputation Systems for Anonymous Networks
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Proceedings of the 28th ACM symposium on Principles of distributed computing
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Optimistic fair exchange with multiple arbiters
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
ZKPDL: a language-based system for efficient zero-knowledge proofs and electronic cash
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Double spending protection for e-cash based on risk management
ISC'10 Proceedings of the 13th international conference on Information security
On the difficulty of achieving anonymity for Vehicle-2-X communication
Computer Networks: The International Journal of Computer and Telecommunications Networking
Usable optimistic fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
A trustworthy ID management mechanism in open market
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Usable optimistic fair exchange
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Double-spending fast payments in bitcoin
Proceedings of the 2012 ACM conference on Computer and communications security
Distributing trusted third parties
ACM SIGACT News
The state of peer-to-peer network simulators
ACM Computing Surveys (CSUR)
Analysis of distribution time of multiple files in a P2P network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Peer-to-peer systems have been proposed for a wide variety of applications, including file-sharing, web caching, distributed computation, cooperative backup, and onion routing. An important motivation for such systems is self-scaling. That is, increased participation increases the capacity of the system. Unfortunately, this property is at risk from selfish participants. The decentralized nature of peer-to-peer systems makes accounting difficult. We show that e-cash can be a practical solution to the desire for accountability in peer-to-peer systems while maintaining their ability to self-scale. No less important, e-cash is a natural fit for peer-to-peer systems that attempt to provide (or preserve) privacy for their participants. We show that e-cash can be used to provide accountability without compromising the existing privacy goals of a peer-to-peer system. We show how e-cash can be practically applied to a file sharing application. Our approach includes a set of novel cryptographic protocols that mitigate the computational and communication costs of anonymous e-cash transactions, and system design choices that further reduce overhead and distribute load. We conclude that provably secure, anonymous, and scalable peer-to-peer systems are within reach.