{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T11:12:39Z","timestamp":1767093159108,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447839","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"119-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Decentralized Reputation"],"prefix":"10.1145","author":[{"given":"Tassos","family":"Dimitriou","sequence":"first","affiliation":[{"name":"Kuwait University, Kuwait City, Kuwait"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0056"},{"key":"e_1_3_2_1_2_1","volume-title":"International workshop on peer-to-peer systems","author":"Douceur J.R.","year":"2002","unstructured":"J.R. Douceur . \" The sybil attack.\" In International workshop on peer-to-peer systems , 2002 . J.R. Douceur. \"The sybil attack.\" In International workshop on peer-to-peer systems, 2002."},{"issue":"2","key":"e_1_3_2_1_3_1","first-page":"23","article-title":"Trust among strangers in internet transactions: Empirical analysis of ebays reputation system","volume":"11","author":"Resnick Paul","year":"2002","unstructured":"Paul Resnick and Richard Zeckhauser . \" Trust among strangers in internet transactions: Empirical analysis of ebays reputation system .\" The Economics of the Internet and E-commerce , 11 ( 2 ): 23 -- 25 , 2002 . Paul Resnick and Richard Zeckhauser. \"Trust among strangers in internet transactions: Empirical analysis of ebays reputation system.\" The Economics of the Internet and E-commerce, 11(2):23--25, 2002.","journal-title":"The Economics of the Internet and E-commerce"},{"key":"e_1_3_2_1_4_1","first-page":"2","volume-title":"Bartercast: A practical approach to prevent lazy freeriding","author":"Meulpolder Michel","year":"2009","unstructured":"Michel Meulpolder , \" Bartercast: A practical approach to prevent lazy freeriding in p 2 p networks.\" In IEEE International Symposium on Parallel and Distributed Processing , 2009 . Michel Meulpolder, et al. \"Bartercast: A practical approach to prevent lazy freeriding in p2p networks.\" In IEEE International Symposium on Parallel and Distributed Processing, 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592452"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_9"},{"key":"e_1_3_2_1_7_1","first-page":"359","volume-title":"Computer and Communications Security","author":"Clau\u00df S.","year":"2013","unstructured":"S. Clau\u00df , S. Schiffner , and F. Kerschbaum . \" K-anonymous reputation,\" in Proceedings of the 8th ACM SIGSAC Symposium on Information , Computer and Communications Security , 2013 , pp. 359 -- 368 . S. Clau\u00df, S. Schiffner, and F. Kerschbaum. \"K-anonymous reputation,\" in Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, 2013, pp. 359--368."},{"key":"e_1_3_2_1_8_1","first-page":"583","volume-title":"Anonrep: Towards tracking-resistant anonymous reputation,\" in Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation","author":"Zhai E.","year":"2016","unstructured":"E. Zhai , D. I. Wolinsky , R. Chen , E. Syta , C. Teng , and B. Ford . \" Anonrep: Towards tracking-resistant anonymous reputation,\" in Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation , 2016 , pp. 583 -- 596 . E. Zhai, D. I. Wolinsky, R. Chen, E. Syta, C. Teng, and B. Ford. \"Anonrep: Towards tracking-resistant anonymous reputation,\" in Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, 2016, pp. 583--596."},{"key":"e_1_3_2_1_9_1","first-page":"173","article-title":"De-anonymizing social networks","author":"Narayanan A.","year":"2009","unstructured":"A. Narayanan and V. Shmatikov . \" De-anonymizing social networks .\" In Proceedings of the 30th IEEE Symposium on Security and Privacy , 2009 , pp. 173 -- 187 . A. Narayanan and V. Shmatikov. \"De-anonymizing social networks.\" In Proceedings of the 30th IEEE Symposium on Security and Privacy, 2009, pp. 173--187.","journal-title":"Proceedings of the 30th IEEE Symposium on Security and Privacy"},{"key":"e_1_3_2_1_10_1","volume-title":"Supporting privacy in decentralized additive reputation systems.\" In Proceedings of the Second International Conference Trust Management","author":"Pavlov E.","year":"2004","unstructured":"E. Pavlov , J. S. Rosenschein , and Z. Topol . \" Supporting privacy in decentralized additive reputation systems.\" In Proceedings of the Second International Conference Trust Management , 2004 . E. Pavlov, J. S. Rosenschein, and Z. Topol. \"Supporting privacy in decentralized additive reputation systems.\" In Proceedings of the Second International Conference Trust Management, 2004."},{"key":"e_1_3_2_1_11_1","first-page":"291","volume-title":"Methods for computing trust and reputation while preserving privacy.\" In Proceedings of 23rd Annual IFIP WG 11.3 Working Conference Data and Applications Security","author":"Gudes E.","year":"2009","unstructured":"E. Gudes , N. Gal-Oz , and A. Grubshtein . \" Methods for computing trust and reputation while preserving privacy.\" In Proceedings of 23rd Annual IFIP WG 11.3 Working Conference Data and Applications Security , 2009 , pp. 291 -- 298 . E. Gudes, N. Gal-Oz, and A. Grubshtein. \"Methods for computing trust and reputation while preserving privacy.\" In Proceedings of 23rd Annual IFIP WG 11.3 Working Conference Data and Applications Security, 2009, pp. 291--298."},{"volume-title":"Preserving privacy of feedback providers in decentralized reputation systems.\" Computer & Security","author":"Hasan O.","key":"e_1_3_2_1_12_1","unstructured":"O. Hasan , L. Brunie , and E. Bertino . \" Preserving privacy of feedback providers in decentralized reputation systems.\" Computer & Security , vol. 31 , no. 7, Oct. 2012. O. Hasan, L. Brunie, and E. Bertino. \"Preserving privacy of feedback providers in decentralized reputation systems.\" Computer & Security, vol. 31, no. 7, Oct. 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.013"},{"key":"e_1_3_2_1_14_1","first-page":"398","volume-title":"A trustless privacy-preserving reputation system.\" In Proceedings of 31st IFIP TC 11 International Conference ICT Systems Security and Privacy Protection","author":"Schaub A.","year":"2016","unstructured":"A. Schaub , R. Bazin , O. Hasan , and L. Brunie . \" A trustless privacy-preserving reputation system.\" In Proceedings of 31st IFIP TC 11 International Conference ICT Systems Security and Privacy Protection , 2016 , pp. 398 -- 411 . A. Schaub, R. Bazin, O. Hasan, and L. Brunie. \"A trustless privacy-preserving reputation system.\" In Proceedings of 31st IFIP TC 11 International Conference ICT Systems Security and Privacy Protection, 2016, pp. 398--411."},{"key":"e_1_3_2_1_15_1","volume-title":"Reputation systems for anonymous networks.\" In International Symposium on Privacy Enhancing Technologies Symposium","author":"Androulaki E.","year":"2008","unstructured":"E. Androulaki , S.G. Choi , S.M. Bellovin and T. Malkin . \" Reputation systems for anonymous networks.\" In International Symposium on Privacy Enhancing Technologies Symposium , 2008 . E. Androulaki, S.G. Choi, S.M. Bellovin and T. Malkin. \"Reputation systems for anonymous networks.\" In International Symposium on Privacy Enhancing Technologies Symposium, 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Stefan Schiffner Andreas Pashalidis and Elmar Tischhauser. \"On the limits of privacy in reputation systems.\" In Workshop on Privacy in the Electronic Society (WPES) 2011.  Stefan Schiffner Andreas Pashalidis and Elmar Tischhauser. \"On the limits of privacy in reputation systems.\" In Workshop on Privacy in the Electronic Society (WPES) 2011.","DOI":"10.1145\/2046556.2046561"},{"key":"e_1_3_2_1_17_1","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Bethencourt John","year":"2010","unstructured":"John Bethencourt , Elaine Shi , and Dawn Song . \" Signatures of reputation.\" International Conference on Financial Cryptography and Data Security , 2010 . John Bethencourt, Elaine Shi, and Dawn Song. \"Signatures of reputation.\" International Conference on Financial Cryptography and Data Security, 2010."},{"key":"e_1_3_2_1_18_1","volume-title":"Reliability and Security (ARES)","author":"Bemmann Kai","year":"2018","unstructured":"Kai Bemmann , anonymous credentials with reputation system.\" Proceedings of the 13th International Conference on Availability , Reliability and Security (ARES) , 2018 . Kai Bemmann, et al. \"Fully-featured anonymous credentials with reputation system.\" Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES), 2018."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Johannes Bl\u00f6mer Jakob Juhnke and Christina Kolb. \"Anonymous and publicly linkable reputation systems.\" International Conference on Financial Cryptography and Data Security 2015.  Johannes Bl\u00f6mer Jakob Juhnke and Christina Kolb. \"Anonymous and publicly linkable reputation systems.\" International Conference on Financial Cryptography and Data Security 2015.","DOI":"10.1007\/978-3-662-47854-7_29"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Christina Garman Matthew Green and Ian Miers. \"Decentralized Anonymous Credentials.\" In NDSS 2014.  Christina Garman Matthew Green and Ian Miers. \"Decentralized Anonymous Credentials.\" In NDSS 2014.","DOI":"10.14722\/ndss.2014.23253"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.009"},{"key":"e_1_3_2_1_22_1","volume-title":"Beaver: A decentralized anonymous marketplace with secure reputation,\" IACR Cryptology Archive","author":"Soska K.","year":"2016","unstructured":"K. Soska , A. Kwon , N. Christin , and S. Devadas . \" Beaver: A decentralized anonymous marketplace with secure reputation,\" IACR Cryptology Archive , 2016 . K. Soska, A. Kwon, N. Christin, and S. Devadas. \"Beaver: A decentralized anonymous marketplace with secure reputation,\" IACR Cryptology Archive, 2016."},{"key":"e_1_3_2_1_23_1","volume-title":"a decentralized financial trust platform.\" International Conference on Financial Cryptography and Data Security","author":"Thyfronitis Litos Orfeas Stefanos","year":"2017","unstructured":"Orfeas Stefanos Thyfronitis Litos , and Dionysis Zindros . \" Trust is risk : a decentralized financial trust platform.\" International Conference on Financial Cryptography and Data Security , 2017 . Orfeas Stefanos Thyfronitis Litos, and Dionysis Zindros. \"Trust is risk: a decentralized financial trust platform.\" International Conference on Financial Cryptography and Data Security, 2017."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.069"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Martin Florian Johannes Walter and Ingmar Baumgart. \"Sybil-resistant pseudonymization and pseudonym change without trusted third parties.\" Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society 2015.  Martin Florian Johannes Walter and Ingmar Baumgart. \"Sybil-resistant pseudonymization and pseudonym change without trusted third parties.\" Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society 2015.","DOI":"10.1145\/2808138.2808145"},{"key":"e_1_3_2_1_26_1","unstructured":"`Namecoin \" Available at texttthttp:\/\/namecoin.info\/.  `Namecoin \" Available at texttthttp:\/\/namecoin.info\/."},{"key":"e_1_3_2_1_27_1","first-page":"46","article-title":"Certcoin: A namecoin based decentralized authentication system","volume":"6","author":"Fromknecht Conner","year":"2014","unstructured":"Conner Fromknecht , Dragos Velicanu , and Sophia Yakoubov . \" Certcoin: A namecoin based decentralized authentication system .\" Massachusetts Inst. Technol., Cambridge, MA, USA, Tech. Rep 6 ( 2014 ): 46 -- 56 . Conner Fromknecht, Dragos Velicanu, and Sophia Yakoubov. \"Certcoin: A namecoin based decentralized authentication system.\" Massachusetts Inst. Technol., Cambridge, MA, USA, Tech. Rep 6 (2014): 46--56.","journal-title":"Massachusetts Inst. Technol., Cambridge, MA, USA, Tech. Rep"},{"key":"e_1_3_2_1_28_1","volume-title":"Sybil-Resistance, and Accountability.\"","author":"Maram Deepak","year":"2020","unstructured":"Deepak Maram , Harjasleen Malvai , Fan Zhang , Nerla Jean-Louis , Alexander Frolov , Tyler Kell , Tyrone Lobban , Christine Moy , Ari Juels , and Andrew Miller . \"CanDID : Can-Do Decentralized Identity with Legacy Compatibility , Sybil-Resistance, and Accountability.\" , IACR Cryptology Archive , 2020 . Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, and Andrew Miller. \"CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability.\", IACR Cryptology Archive, 2020."},{"key":"e_1_3_2_1_29_1","volume-title":"DECO: Liberating web data using decentralized oracles for TLS.\" In ACM Conference on Computer and Communications Security","author":"Zhang F.","year":"2020","unstructured":"F. Zhang , S. K. D. Maram , H. Malvai , S. Goldfeder , and A. Juels . \" DECO: Liberating web data using decentralized oracles for TLS.\" In ACM Conference on Computer and Communications Security , 2020 . F. Zhang, S. K. D. Maram, H. Malvai, S. Goldfeder, and A. Juels. \"DECO: Liberating web data using decentralized oracles for TLS.\" In ACM Conference on Computer and Communications Security, 2020."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Y.B. Reddy. \"A game theory approach to detect malicious nodes in wireless sensor networks.\" In the Third International Conference on Sensor Technologies and Applications 2009.  Y.B. Reddy. \"A game theory approach to detect malicious nodes in wireless sensor networks.\" In the Third International Conference on Sensor Technologies and Applications 2009.","DOI":"10.1109\/SENSORCOMM.2009.76"},{"key":"e_1_3_2_1_31_1","unstructured":"T.P. Pedersen. \"Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.\" In CRYPTO '911.  T.P. Pedersen. \"Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.\" In CRYPTO '911."},{"key":"e_1_3_2_1_32_1","volume-title":"Springer","author":"Gennaro Rosario","year":"2013","unstructured":"Rosario Gennaro , Craig Gentry , Bryan Parno , and Mariana Raykova . \"Quadratic span programs and succinct NIZKs without PCPs.\" In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 626--645 . Springer , Berlin, Heidelberg , 2013 . Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova. \"Quadratic span programs and succinct NIZKs without PCPs.\" In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 626--645. Springer, Berlin, Heidelberg, 2013."},{"key":"e_1_3_2_1_33_1","volume-title":"Decentralized anonymous payments from bitcoin.\" In IEEE Symposium on Security and Privacy","author":"Sasson Eli Ben","year":"2014","unstructured":"Eli Ben Sasson , Alessandro Chiesa , Christina Garman , Matthew Green , Ian Miers , Eran Tromer , and Madars Virza . \"Zerocash : Decentralized anonymous payments from bitcoin.\" In IEEE Symposium on Security and Privacy , 2014 . Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. \"Zerocash: Decentralized anonymous payments from bitcoin.\" In IEEE Symposium on Security and Privacy, 2014."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","first-page":"944","DOI":"10.1109\/SP.2018.00018","volume-title":"A Framework for Efficient Verifiable Computation.\" In 2018 IEEE Symposium on Security and Privacy (SP)","author":"Kosba Ahmed E.","year":"2018","unstructured":"Ahmed E. Kosba , Charalampos Papamanthou , and Elaine Shi . \"xJsnark : A Framework for Efficient Verifiable Computation.\" In 2018 IEEE Symposium on Security and Privacy (SP) , pp. 944 -- 961 . IEEE , 2018 . Ahmed E. Kosba, Charalampos Papamanthou, and Elaine Shi. \"xJsnark: A Framework for Efficient Verifiable Computation.\" In 2018 IEEE Symposium on Security and Privacy (SP), pp. 944--961. IEEE, 2018."},{"key":"e_1_3_2_1_36_1","volume-title":"SEC'14","author":"Ben-Sasson E.","year":"2014","unstructured":"E. Ben-Sasson , A. Chiesa , E. Tromer , and M. Virza . \" Succinct non-interactive zero knowledge for a von neumann architecture.\" In the 23rd USENIX Conference on Security Symposium , SEC'14 , 2014 E. Ben-Sasson, A. Chiesa, E. Tromer, and M. Virza. \"Succinct non-interactive zero knowledge for a von neumann architecture.\" In the 23rd USENIX Conference on Security Symposium, SEC'14, 2014"},{"key":"e_1_3_2_1_37_1","volume-title":"\"Trusted computing: Providing security for peer-to-peer networks.\" In 5th IEEE International Conference on Peer-to-Peer Computing","author":"Balfe Shane","year":"2005","unstructured":"Shane Balfe , Amit D. Lakhani , and Kenneth G. Paterson . \"Trusted computing: Providing security for peer-to-peer networks.\" In 5th IEEE International Conference on Peer-to-Peer Computing , 2005 . Shane Balfe, Amit D. Lakhani, and Kenneth G. Paterson. \"Trusted computing: Providing security for peer-to-peer networks.\" In 5th IEEE International Conference on Peer-to-Peer Computing, 2005."},{"key":"e_1_3_2_1_38_1","unstructured":"Trusted Computing Group: TCG TPM specifications texttthttps:\/\/www.trustedcomputinggroup.org  Trusted Computing Group: TCG TPM specifications texttthttps:\/\/www.trustedcomputinggroup.org"},{"key":"e_1_3_2_1_39_1","volume-title":"Direct anonymous attestation.\" In 11th ACM Conference on Computer and Communications Security","author":"Chen L.","year":"2004","unstructured":"L. Chen , E. Brickell , and J. Camenisch . \" Direct anonymous attestation.\" In 11th ACM Conference on Computer and Communications Security , 2004 . L. Chen, E. Brickell, and J. Camenisch. \"Direct anonymous attestation.\" In 11th ACM Conference on Computer and Communications Security, 2004."}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":38,"alternative-id":["10.1145\/3422337.3447839","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447839","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}