Using Payments to Promote Cooperation in Anonymity Protocols

نویسندگان

  • Daniel R. Figueiredo
  • Jonathan K. Shapiro
  • Don Towsley
چکیده

Like many peer-to-peer applications, anonymous communication systems are vulnerable to freeriders, peers that use the system while providing little or no service to others. To complicate matters, the identity of the free-rider is obscured by the very anonymity such systems are designed to provide, imposing challenging design constraints for incentive mechanisms to discourage free-riding. We argue that these constraints are well addressed by requiring currency to be exchanged in return for service. Based on this idea, we propose a novel technique to allow anonymous digital cash payments to be made to those who provide service. We incorporate this technique into a class of peer-peer anonymous protocols that are based on Chaumian mixes while introducing modest message delay overheads and preserving their architectural simplicity. Finally, we formulate an abstract model of self-interested users in such a system and show that a payment based incentive mechanism can significantly improve the degree of anonymity by fostering greater cooperation among peers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Incentives for Cooperation in Anonymity Systems

Like many peer-to-peer applications, anonymous communication systems are vulnerable to freeriders, peers who use the system while providing little or no service to others. To complicate matters, the identity of the free-rider is obscured by the very service anonymity systems are designed to provide, which limits the efficacy of conventional approaches for promoting cooperation (e.g., reputation...

متن کامل

ارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا

The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases,   the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...

متن کامل

Ein mißbrauchfreies anonymes elektronisches Zahlungssystem

While anonymous payments are necessary for privacy reasons, they can as well be misused for criminal activities: Anonymous electronic cash can be used to conduct crimes that would be impossible with physical cash. As potential misuse of anonymity cannot be tolerated, the allowed anonymity has to be restricted. Payment systems with restricted anonymity are commonly based on the concept of a trus...

متن کامل

Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)

Over the last years‎, ‎the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. ‎Security and efficiency could be the main challenges of that communication‎‎. ‎‎On the other hand, ‎ authenticity and confidentiality are two important goals to provide desired security in an information system‎, including IoT-based applications. An Authentication an...

متن کامل

An Optimal Game Theoretical Framework for Mobility Aware Routing in Mobile Ad hoc Networks

Selfish behaviors are common in self-organized Mobile Ad hoc Networks (MANETs) where nodes belong to different authorities. Since cooperation of nodes is essential for routing protocols, various methods have been proposed to stimulate cooperation among selfish nodes. In order to provide sufficient incentives, most of these methods pay nodes a premium over their actual costs of participation. Ho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003