Portable reputation: Proving ownership of reputations across portals - - PowerPoint PPT Presentation

portable reputation proving ownership of reputations
SMART_READER_LITE
LIVE PREVIEW

Portable reputation: Proving ownership of reputations across portals - - PowerPoint PPT Presentation

Portable reputation: Proving ownership of reputations across portals Sandeep S. Kumar & Paul Koster Information & System Security Group, Philips Research September 09, 2009 Reputation locked in portals 2 Information & System


slide-1
SLIDE 1

Sandeep S. Kumar & Paul Koster Information & System Security Group, Philips Research September 09, 2009

Portable reputation: Proving ownership

  • f reputations across portals
slide-2
SLIDE 2

Reputation locked in portals

Information & System Security Group, Philips Research, September 09, 2009

2

slide-3
SLIDE 3

How does a Reputation System work?

What is reputation? Historic behavior Reputation Systems

Information & System Security Group, Philips Research, September 09, 2009

3

Reputation Systems

  • Collect historic behavior
  • Aggregate
  • Distribute

Different reputation system frameworks with different parameters

slide-4
SLIDE 4

The reputation dilemma

  • Reputation is an important (valuable) ingredient for creation of trust
  • Positive reputation is a hard earned

– Over long time – By consistent behavior

Information & System Security Group, Philips Research, September 09, 2009

4

– By consistent behavior – Observed and guaranteed by a 3rd party (the portal)

  • Unfortunately

– Use of new portals require users to start with no reputation – Locks users to their existing portal

  • Good for portals ↔ Bad for users
slide-5
SLIDE 5

Scenario sketch: Portable reputation

Portal A Portal B Portal C Alpha Beta Gamma

Alpha | R1 Beta | R2 Gamma | R3

Information & System Security Group, Philips Research, September 09, 2009

5

Alice Bob Gamma

I’m Alpha, Beta & Gamma I don’t trust they are yours

slide-6
SLIDE 6

Problem : Portable reputation

  • Users would like to combine all their (little positive) reputations at

multiple portals to show their trustworthiness – All portals cannot be practically expected to use a single Federated Identity provider

Information & System Security Group, Philips Research, September 09, 2009

6

– Portals (often competing) will not actively co-operate in transfer of reputation ratings.

  • For privacy reasons, users would ideally not like all his pseudonyms

linked by anyone but only the party he intends to interact

slide-7
SLIDE 7

Solution sketch: Portable reputation

Map problem of portable reputation to the problem of proving

  • wnership of pseudonyms at the different portals

Leave aggregation and weights to attach to each individual reputation to the receiving party.

Information & System Security Group, Philips Research, September 09, 2009

7

the receiving party. Cryptographic prelims - Discrete Log problems

  • Given gm, finding m hard
  • Given gx and gy, finding gxy hard
slide-8
SLIDE 8

Solution sketch: Portable reputation

Portal A Portal B Portal C Alpha Beta Gamma

Alpha | R1 Beta | R2 Gamma | R3 g Kα g Kβ g Kγ

Information & System Security Group, Philips Research, September 09, 2009

8

Alice Bob Gamma

ZK-Protocol Kα, Kβ, Kγ I don’t trust they all are yours

slide-9
SLIDE 9

Solution sketch: Portable reputation

Portal A Portal B Portal C Alpha Beta Gamma

Alpha | R1 Beta | R2 Gamma | R3 g Kα, g Kα . S g Kβ, g Kβ . S g Kγ, g Kγ . S

Information & System Security Group, Philips Research, September 09, 2009

9

Alice Bob Gamma

ZK-Protocol Prove S OK!

slide-10
SLIDE 10

The protocol

Alice Bob

List all pseudonyms

fetch

  • Information & System Security Group, Philips Research, September 09, 2009

10

slide-11
SLIDE 11

Conclusion: Portable reputation

  • Allows users to claim their reputation without active

cooperation of portals

  • Pseudonym privacy by linking is not affected

Information & System Security Group, Philips Research, September 09, 2009

11

  • Cryptographically secure way to prove reputations actually

belong to the user and not borrowed.

slide-12
SLIDE 12