earticle

논문검색

A Reputation System Preserving the Privacy of Feedback Providers and Resisting Sybil Attacks

목차

Abstract
 1. Introduction
 2. Related Work
 3. Preliminaries
  3.1. Bilinear Maps
  3.2. Strong RSA Assumption
  3.3. CL Signatures
  3.4. DY Pseudorandom Function
  3.5. Pedersen commitment
  3.6. Non-Interactive zero- Knowledge Proof
 4. Protocol Description
  4.1. Protocol Overview
  4.2. Protocol outline
 5. Security Analysis
  5.1. Security Analysis
  5.2. Sybil-Proof property
  5.3. Malicious TVM peers
 6. Efficiency Analysis
 7. Conclusion
 Acknowledgements
 References

저자정보

  • Keli Zhang Information Security Center, Beijing University of Posts and Telecommunications, 100876, Beijing, China
  • Zhongxian Li Information Security Center, Beijing University of Posts and Telecommunications, Nation Cybernet Security Limited, 100080, Beijing, China
  • Yixian Yang Information Security Center, Beijing University of Posts and Telecommunications, 100876, Beijing, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.