Skip to main content

Running on Karma – P2P Reputation and Currency Systems

  • Conference paper
Cryptology and Network Security (CANS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4856))

Included in the following conference series:

Abstract

Peer-to-peer (P2P) systems allow users to share resources with little centralized control. Malicious users can abuse the system by contributing polluted resources. Moreover, selfish users may just connect for their own benefits without donating any resources. The concepts of reputation and currency give possible approaches to address these problems. However, to implement these ideas is non-trivial, due to the non-existence of a single trusted party. Existing works circumvent this by placing trust assumption on certain nodes of an overlay network. This work presents a new reputation system and a new currency system. Our designs are simple thanks to the full use of the trust assumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Adar, E., Huberman, B.A.: Free Riding on Gnutella. First Monday 5(10) (October 2000), http://firstmonday.org/issues/issue5_10/adar

  2. Back, A.: Hashcash - a Denial of Service Counter Measure, http://www.hashcash.org/papers/hashcash.pdf

  3. Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure Routing for Structured Peer-to-Peer Overlay Networks. SIGOPS Operating Systems Review 36/SI, 299–314 (2002)

    Article  Google Scholar 

  5. Cohen, B.: Incentives Build Robustness in BitTorrent. In: Workshop on Economics of Peer-to-peer Systems (2003)

    Google Scholar 

  6. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. Computer and Communications Security 2002 , 207–216 (2002)

    Google Scholar 

  7. Dwork, C., Goldberg, A., Naor, M.: On Memory-Bound Functions for Fighting Spam. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 426–444. Springer, Heidelberg (2003)

    Google Scholar 

  8. Garcia, F.D., Hoepman, J.-H.: Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 364–377. Springer, Heidelberg (2005)

    Google Scholar 

  9. Garcia-Martinez, A., Chuang, J.: A Cryptographic Reputation Scheme for Peer-to-peer Networks, http://citeseer.ist.psu.edu/550626.html

  10. Gupta, M., Judge, P., Ammar, M.: A Reputation System for Peer-to-Peer Networks. In: NOSSDAV 2003. Network and Operating Systems Support for Digital Audio and Video, pp. 144–152 (2003)

    Google Scholar 

  11. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust Algorithm for Reputation Management in P2P Networks. In: World Wide Web Conference 2003, pp. 640–651 (2003)

    Google Scholar 

  12. Kirk, P.: Gnutella, http://rfc-gnutella.sourceforge.net

  13. Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. Computer Communication Review 31(4), 161–172

    Google Scholar 

  14. Rowstron, A., Druschel, P.: Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)

    Google Scholar 

  15. Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In: SIGCOMM 2001, pp. 149–160

    Google Scholar 

  16. Zhao, B.Y., Huang, L., Rhea, S.C., Stribling, J., Joseph, A.D., Kubiatowicz, J.D.: Tapestry: A Global-Scale Overlay for Rapid Service Deployment. IEEE J-SAC 22(1), 41–53 (2004)

    Google Scholar 

  17. KaZaA.com. The Guide - The Glossary: Participation Level, Available at http://www.kazaa.com/us/help/glossary/participation_ratio.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Feng Bao San Ling Tatsuaki Okamoto Huaxiong Wang Chaoping Xing

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chow, S.S.M. (2007). Running on Karma – P2P Reputation and Currency Systems. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds) Cryptology and Network Security. CANS 2007. Lecture Notes in Computer Science, vol 4856. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76969-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-76969-9_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-76968-2

  • Online ISBN: 978-3-540-76969-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics