Credit networks model transitive IOweYou (IOU) credit between their users. With their flexible-yet-scalable design and robustness against intrusion, we are observing a rapid increase in their popularity as a backbone of real-world permission-less payment settlement networks (e.g., Ripple and Stellar) as well as several other weak-identity systems requiring Sybil-tolerant communication. In payment scenarios, due to their unique capability to unite emerging crypto-currencies and user-defined currencies with the traditional fiat currency and banking systems, several existing and new payment enterprises are entering in this space. Nevertheless, this enthusiasm in the market significantly exceeds our understanding of security, privacy, and reliability of these inherently distributed systems. Currently employed ad hoc strategies to fix apparent flaws have made those systems vulnerable to bigger problems once they become lucrative targets for malicious players. In this tutorial, we first define the concept of IOU credit networks, and describe some of the important credit network applications. We then describe and analyze recent and ongoing projects to improve the credit-network security, privacy and reliability. We end our discussion with interesting open problems and systems challenges in the field. This introductory tutorial is accessible to the standard CCS audience with graduate-level security knowledge.
[1]
Earl T. Barr,et al.
TrustDavis: a non-exploitable online reputation system
,
2005,
Seventh IEEE International Conference on E-Commerce Technology (CEC'05).
[2]
Alan Mislove,et al.
Bazaar: Strengthening User Reputations in Online Marketplaces
,
2011,
NSDI.
[3]
Giulio Malavolta,et al.
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
,
2017,
NDSS.
[4]
Pedro Moreno-Sanchez,et al.
Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network
,
2016,
Proc. Priv. Enhancing Technol..
[5]
Stefan Thomas,et al.
A Protocol for Interledger Payments
,
2016
.
[6]
Aziz Mohaisen,et al.
Keep your friends close: Incorporating trust into social network-based Sybil defenses
,
2011,
2011 Proceedings IEEE INFOCOM.
[7]
Krishna P. Gummadi,et al.
Ostra: Leveraging Trust to Thwart Unwanted Communication
,
2008,
NSDI.
[8]
David M. Pennock,et al.
Mechanism Design on Trust Networks
,
2007,
WINE.
[9]
Pedro Moreno-Sanchez,et al.
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces
,
2015,
NDSS.