Filters








906 Hits in 1.8 sec

Provably Manipulation-Resistant Reputation Systems [article]

Paul Christiano
2014 arXiv   pre-print
In this setting, our protocol achieves nearly optimal collective welfare while remaining resistant to exploitation.  ...  Manipulation-resistance: Another literature addresses the question of modifying recommendation systems to limit the influence of sybils, fake identities controlled by an attacker.  ...  Other reputation systems: Reputation systems have been the focus of substantial research across a wide range of contexts, for example see [11, 12, 21] .  ... 
arXiv:1411.1127v1 fatcat:quzimn3kdndlrhy5yvhx7lmryu

Provably manipulation-resistant reputation systems

Paul Christiano
2016 Annual Conference Computational Learning Theory  
Many reputation systems are vulnerable to manipulation, and protected only by keeping algorithms secret, avoiding high-stakes applications, or using side information to identify malicious users.  ...  We propose a reputation system which provably achieves a very strong correctness guarantee under extremely pessimistic assumptions-it works even given a supermajority of malicious users, converges to optimal  ...  Manipulation-resistance: Another literature attempts to modify reputation systems to limit the influence of sybils, fake identities controlled by an attacker.  ... 
dblp:conf/colt/Christiano16 fatcat:xd7mdxiysfeghmipomhn2mkvgi

The influence limiter

Paul Resnick, Rahul Sami
2007 Proceedings of the 2007 ACM conference on Recommender systems - RecSys '07  
We describe an influence-limiting algorithm that can turn existing recommender systems into manipulation-resistant systems.  ...  An attacker can draw attention to items that don't deserve that attention by manipulating recommender systems.  ...  However, they do not address the development of a provably attack-resistant algorithm.  ... 
doi:10.1145/1297231.1297236 dblp:conf/recsys/ResnickS07 fatcat:ozaj2mxywrctldcz6jjxmnwy2a

Conference on Learning Theory 2016: Preface

Vitaly Feldman, Alexander Rakhlin
2016 Annual Conference Computational Learning Theory  
Reputation Systems" by Paul Christiano received the Best Student Paper Award.  ...  The paper "Multi-scale Exploration of Convex Functions and Bandit Convex Optimization" by Sébastien Bubeck and Ronen Eldan received the Best Paper Award, and the paper "Provably Manipulation-resistant  ... 
dblp:conf/colt/FeldmanR16 fatcat:o6uoribc6zgyrgzf5liu4koauq

Manipulation-Resistant Reputations Using Hitting Time

John Hopcroft, Daniel Sheldon
2008 Internet Mathematics  
Popular reputation systems for linked networks can be manipulated by spammers who strategically place links.  ...  We develop a reputation system based on hitting time and show that it resists tampering by individuals or groups who strategically place outlinks.  ...  This paper develops a reputation system based on hitting time that is provably resistant to manipulation.  ... 
doi:10.1080/15427951.2008.10129303 fatcat:wirk77s2yjfxhitsbgq36oejru

Gossip-based aggregation of trust in decentralized reputation systems

Yoram Bachrach, Ariel Parnes, Ariel D. Procaccia, Jeffrey S. Rosenschein
2008 Autonomous Agents and Multi-Agent Systems  
Decentralized Reputation Systems have recently emerged as a prominent method of establishing trust among self-interested agents in online environments.  ...  A key issue is the efficient aggregation of data in the system; several approaches have been proposed, but they are plagued by major shortcomings.  ...  Therefore, without augmenting the system with additional security measures, this manipulation is difficult to detect.  ... 
doi:10.1007/s10458-008-9073-6 fatcat:iymqvkpztrdctjsgq3sekletzy

Towards Trustworthy DeFi Oracles: Past,Present and Future [article]

Yinjie Zhao, Xin Kang, Tieyan Li, Cheng-Kang Chu, Haiguang Wang
2022 arXiv   pre-print
After that, we introduce five popular DeFi oracles currently in use(such as Chainlink and Band Protocol), with the focus on their system architecture, data validation process,and their incentive mechanisms  ...  Such risks are accepted by Provable users and backed by Provable company¡ s credit [15] .  ...  Provable claims that with authenticity proof users can receive data from Provable without trust.  ... 
arXiv:2201.02358v1 fatcat:xy34qz5i35azdklz2u3mx3k5le

Towards Trustworthy DeFi Oracles: Past, Present and Future

Yinjie Zhao, Xin Kang, Tieyan Li, Cheng-Kang Chu, Haiguang Wang
2022 IEEE Access  
After that, we introduce five popular DeFi oracles currently in use (such as Chainlink and Band Protocol), with the focus on their system architecture, data validation process, and their incentive mechanisms  ...  Provable claims that with authenticity proof users can receive data from Provable without trust.  ...  In the system, reputation flows from witnesses with worse reputations to those with higher reputations.  ... 
doi:10.1109/access.2022.3179374 fatcat:pjf5lkdyrfcvvmn77ipybc2cxi

Veracity, Plausibility, and Reputation [chapter]

Dieter Gollmann
2012 Lecture Notes in Computer Science  
We examine examples for veracity mechanisms from network management and conclude with a discussion of security in cyberphysical systems.  ...  A security analysis of a reputation system must now in turn consider the impact of false reputation ratings.  ...  Reputation systems employ witnesses on witnesses, i.e. entities that make statements (reputation ratings) about the veracity of statements made by other witnesses.  ... 
doi:10.1007/978-3-642-30955-7_3 fatcat:xem7iekawbaijoiinszw7bshui

Blockchain Oracle Design Patterns [article]

Amirmohammad Pasdar, Zhongli Dong, Young Choon Lee
2021 arXiv   pre-print
We classify the blockchain oracle techniques into two major groups such as voting-based strategies and reputation-based ones.  ...  Although promising, blockchains and smart contracts have no access to the external systems (i.e., off-chain) where real-world data and events resides; consequently, the usability of smart contracts in  ...  The outcome of voting and certification is the stakeweighted sum of votes or certifies, respectively, and due to the random nature, it is resistant to manipulation.  ... 
arXiv:2106.09349v1 fatcat:jcobgywz2zfgvfragre5qpolc4

Reputation in privacy enhancing technologies

Roger Dingledine, Nick Mathewson, Paul Syverson
2002 Proceedings of the 12th annual conference on Computers, freedom and privacy - CFP '02  
While reputation might superficially seem inimical to privacy concerns, systems with explicit reputation can actually enable privacy by controlling the flow of information about pseudonymous individuals  ...  As with security, it is tempting but incorrect to think that reputation is a simple matter of bolting an extra service to the side of an existing system.  ...  This reputation system attempts to improve reliability in a long-term sense, rather than giving provable delivery guarantees for each message.  ... 
doi:10.1145/543482.543507 fatcat:4yh7ggxeynhq5nmpxvqkriso4m

Reputation in privacy enhancing technologies

Roger Dingledine, Nick Mathewson, Paul Syverson
2002 Proceedings of the 12th annual conference on Computers, freedom and privacy - CFP '02  
While reputation might superficially seem inimical to privacy concerns, systems with explicit reputation can actually enable privacy by controlling the flow of information about pseudonymous individuals  ...  As with security, it is tempting but incorrect to think that reputation is a simple matter of bolting an extra service to the side of an existing system.  ...  This reputation system attempts to improve reliability in a long-term sense, rather than giving provable delivery guarantees for each message.  ... 
doi:10.1145/543505.543507 fatcat:jn4kkeji3nbufe2lru2e4iuycm

A Sybil-Resistant and Decentralized Market Place [article]

Naqib Zarin, Dirk van Bokkem, Justin Segond, Stefanie Roos
2022 arXiv   pre-print
Reputation systems only solve this problem partially as malicious users can re-join the network with a new identity if their reputation is too low.  ...  Existing centralised market places such as Ebay enable companies to gather large amounts of personal data that can be used to manipulate users.  ...  system who then boost each others' reputation.  ... 
arXiv:2201.10407v1 fatcat:pjgqspwrbfafdjdsajagn3uuyq

Anonymity And Accountability In Web Based Transactions

H Jayasree
2012 Advanced Computing An International Journal  
Hence there is a need for the ultimate structure of the new electronic transaction system that has a substantial impact on the personal privacy as well as on the nature and extent of criminal use of E-transactions  ...  The infrastructure allows realization of untraceable payment systems which offer improved audit -ability, accountability and control compared to current systems, while at the same time offering increased  ...  Accountability is required to make entities within the system responsible for their acts. The main focus of our research was to provide accountable anonymity.  ... 
doi:10.5121/acij.2012.3217 fatcat:5qu4guzzwjdtxkezb7fs47rgpi

Computational challenges in e-commerce

Joan Feigenbaum, David C. Parkes, David M. Pennock
2009 Communications of the ACM  
Designing rating systems that are resistant to manipulation is an important challenge, requiring both good algorithms and good economics. 28 Peer Production and interaction "Peer production," a term  ...  Unlike forecasts, rating and reputation systems have no fundamental truths on which to base rewards.  ... 
doi:10.1145/1435417.1435435 fatcat:anv4iq4et5hmbg5ekzy4f5hea4
« Previous Showing results 1 — 15 out of 906 results