Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes

  • Authors:
  • Antonis Michalas;Tassos Dimitriou;Thanassis Giannetsos;Nikos Komninos;Neeli R. Prasad

  • Affiliations:
  • Athens Information Technology, Algorithms and Security Group, Athens, Greece and Department of Electronic Systems, University of Aalborg, Aalborg, Denmark;Athens Information Technology, Algorithms and Security Group, Athens, Greece;Athens Information Technology, Algorithms and Security Group, Athens, Greece and Department of Electronic Systems, University of Aalborg, Aalborg, Denmark;Athens Information Technology, Algorithms and Security Group, Athens, Greece;Department of Electronic Systems, University of Aalborg, Aalborg, Denmark

  • Venue:
  • Wireless Personal Communications: An International Journal
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we focus on attacks and defense mechanisms in additive reputation systems. We start by surveying the most important protocols that aim to provide privacy between individual voters. Then, we categorize attacks against additive reputation systems considering both malicious querying nodes and malicious reporting nodes that collaborate in order to undermine the vote privacy of the remaining users. To the best of our knowledge this is the first work that provides a description of such malicious behavior under both semi-honest and malicious model. In light of this analysis we demonstrate the inefficiencies of existing protocols.