Trust Is Risk: A Decentralized Financial Trust Platform

Centralized reputation systems use stars and reviews and thus require algorithm secrecy to avoid manipulation. In autonomous open source decentralized systems this luxury is not available. We create a reputation network for decentralized marketplaces where the trust each user gives to the other users is quantifiable and expressed in monetary terms. We introduce a new model for bitcoin wallets in which user coins are split among trusted associates. Direct trust is defined using shared bitcoin accounts via bitcoin’s 1-of-2 multisig. Indirect trust is subsequently defined transitively. This enables formal game theoretic arguments pertaining to risk analysis. We prove that risk and maximum flows are equivalent in our model and that our system is Sybil-resilient. Our system allows for concrete financial decisions on the subjective monetary amount a pseudonymous party can be trusted with. Risk remains invariant under a direct trust redistribution operation followed by a purchase.

[1]  Y. Adam,et al.  Synereo: The Decentralized and Distributed Social Network , 2015 .

[2]  Valentin Cristea,et al.  Decentralized Trust Management in Peer-to-Peer Systems , 2011, 2011 10th International Symposium on Parallel and Distributed Computing.

[3]  Earl T. Barr,et al.  TrustDavis: a non-exploitable online reputation system , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).

[4]  L. Mui,et al.  A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[5]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[6]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[7]  James B. Orlin,et al.  Max flows in O(nm) time, or better , 2013, STOC '13.

[8]  Srinivas Devadas,et al.  Beaver: A Decentralized Anonymous Marketplace with Secure Reputation , 2016, IACR Cryptol. ePrint Arch..

[9]  David Schwartz,et al.  The Ripple Protocol Consensus Algorithm , 2014 .

[10]  Dieter Gollmann,et al.  Why Trust is Bad for Security , 2006, Electron. Notes Theor. Comput. Sci..

[11]  Andreas M. Antonopoulos,et al.  Mastering Bitcoin: Unlocking Digital Crypto-Currencies , 2014 .

[12]  Vana Kalogeraki,et al.  Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.

[13]  Philip Zimmermann,et al.  PGP source code and internals , 1995 .

[14]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[15]  Carlisle Adams,et al.  Understanding PKI: Concepts, Standards, and Deployment Considerations , 1999 .

[16]  Alan Mislove,et al.  Bazaar: Strengthening User Reputations in Online Marketplaces , 2011, NSDI.

[17]  M. Mobius,et al.  Trust and Social Collateral , 2007 .

[18]  Germano Caronni,et al.  Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).

[19]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[20]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[21]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[22]  Prabodh Saxena,et al.  Lines of Credit , 2016 .

[23]  Pedro Moreno-Sanchez,et al.  Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces , 2015, NDSS.

[24]  David Mazières The Stellar Consensus Protocol : A Federated Model for Internet-level Consensus , 2015 .

[25]  Giulio Malavolta,et al.  SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks , 2017, NDSS.

[26]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[27]  Ravindra K. Ahuja,et al.  Network Flows: Theory, Algorithms, and Applications , 1993 .

[28]  Ronald L. Rivest,et al.  Introduction to Algorithms, 3rd Edition , 2009 .

[29]  Guido Wirtz,et al.  Decentralized Reputation Management for Cooperating Software Agents in Open Multi-Agent Systems , 2006, Int. Trans. Syst. Sci. Appl..

[30]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[31]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.