{"title":"在信誉系统中提供匿名性的框架","authors":"Hugo M. Miranda, L. Rodrigues","doi":"10.1109/mobiq.2006.340391","DOIUrl":null,"url":null,"abstract":"In ubiquitous networks, the multiple devices carried by an user may unintentionally expose information about her habits or preferences. This information leakage can compromise the users' right to privacy. A common approach to increase privacy is to hide the user real identity under a pseudonym. Unfortunately, pseudonyms may interfere with the reputation systems that are often used to assert the reliability of the information provided by the participants in the network. This paper presents a framework for combining anonymity with reputation and shows that it can be configured to provide a desired degree of balance between these two conflicting goals. The proposed solution leverages on well-known cryptographic techniques, such as public key infrastructure and blind signatures","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"A Framework to Provide Anonymity in Reputation Systems\",\"authors\":\"Hugo M. Miranda, L. Rodrigues\",\"doi\":\"10.1109/mobiq.2006.340391\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In ubiquitous networks, the multiple devices carried by an user may unintentionally expose information about her habits or preferences. This information leakage can compromise the users' right to privacy. A common approach to increase privacy is to hide the user real identity under a pseudonym. Unfortunately, pseudonyms may interfere with the reputation systems that are often used to assert the reliability of the information provided by the participants in the network. This paper presents a framework for combining anonymity with reputation and shows that it can be configured to provide a desired degree of balance between these two conflicting goals. The proposed solution leverages on well-known cryptographic techniques, such as public key infrastructure and blind signatures\",\"PeriodicalId\":440604,\"journal\":{\"name\":\"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/mobiq.2006.340391\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/mobiq.2006.340391","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Framework to Provide Anonymity in Reputation Systems
In ubiquitous networks, the multiple devices carried by an user may unintentionally expose information about her habits or preferences. This information leakage can compromise the users' right to privacy. A common approach to increase privacy is to hide the user real identity under a pseudonym. Unfortunately, pseudonyms may interfere with the reputation systems that are often used to assert the reliability of the information provided by the participants in the network. This paper presents a framework for combining anonymity with reputation and shows that it can be configured to provide a desired degree of balance between these two conflicting goals. The proposed solution leverages on well-known cryptographic techniques, such as public key infrastructure and blind signatures