TRUST MANAGEMENT WITHOUT REPUTATION IN P2P GAMES

Adam Wierzbicki

2006

Abstract

The article considers trust management in Peer-to-Peer (P2P) systems without using reputation. The aim is to construct mechanisms that allow to enforce trust in P2P applications, where individual peers have a high possibility of unfair behaviour that is strongly adverse to the utility of other users. An example of such an application of P2P computing is P2P Massive Multi-user Online Games, where cheating by players is simple without centralized control or specialized trust management mechanisms. The article presents new techniques for trust enforcement that use cryptographic methods and are adapted to the dynamic membership and resources of P2P systems.

References

  1. A.Wierzbicki, T.Kucharski: “P2P Scrabble. Can P2P games commence?”, Fourth Int. IEEE Conference on Peer-to-Peer Computing , Zurich, August 2004, pp. 100-107
  2. A. Wierzbicki, T. Kucharski, Fair and Scalable P2P Games of Turns, Eleventh International Conference on Parallel and Distributed Systems (ICPADS'05), Fukuoka, Japan, pp. 250-256
  3. B. Knutsson, Honghui Lu, Wei Xu, B. Hopkins, Peer-toPeer Support for Massively Multiplayer Games, IEEE INFOCOM 2004
  4. N. E. Baughman, B. Levine, Cheat-proof playout for centralized and distributed online games, INFOCOM 2001, pp 104-113
  5. E.J. Berglund and D.R. Cheriton. Amaze: A multiplayer computer game. IEEE Software, 2(1), 1985.
  6. J. Menezes, P. C. van Oorschot, S. A. Vanstone, Handbook of applied cryptography, CRC Press, ISBN: 0-8493-8523-7, October 1996
  7. L. Lamport, R. Shostak, M. Pease, Byzantine Generals Problem, ACM Trans. on Programming Laguages and Systems, pp 382-401
  8. M. Tompa and H. Woll, How to share a secret with cheaters, Research Report RC 11840, IBM Research Division, 1986
  9. J. Douceur, The Sybil Attack, In Proc. of the IPTPS02 Workshop, Cambridge, MA (USA), 2002
  10. D.Agrawal et al., An Integrated Solution for Secure Group Communication in Wide-Area Netwokrs, Proc. 6th IEEE Symposium on Comp. and Comm., 2001,
  11. Zona Inc. Terazona: Zona application framework white paper, 2002
  12. H. Nguyen, H. Morino, A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography or Providing Fast Authentication and Low Signaling Load, T. Enokido et al. (Eds.): EUC Workshops 2005, LNCS 3823, pp. 905 - 915, 2005
  13. L. Mui, Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks, Ph.D. Dissertation, Massachusetts Institute of Technology, 2003
  14. K.Aberer, Z.Despotovic (2001), Managing Trust in a PeerTo-Peer Information System, Proc. tenth int. conf. Information and knowledge management, 310-317
  15. P. Gmytrasiewicz, E. Durfee, Toward a theory of honesty and trust among communicating autonomous agents Group Decision and Negotiation 1993. 2:237-258.
Download


Paper Citation


in Harvard Style

Wierzbicki A. (2006). TRUST MANAGEMENT WITHOUT REPUTATION IN P2P GAMES . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 126-134. DOI: 10.5220/0002104901260134


in Bibtex Style

@conference{secrypt06,
author={Adam Wierzbicki},
title={TRUST MANAGEMENT WITHOUT REPUTATION IN P2P GAMES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={126-134},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002104901260134},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - TRUST MANAGEMENT WITHOUT REPUTATION IN P2P GAMES
SN - 978-972-8865-63-4
AU - Wierzbicki A.
PY - 2006
SP - 126
EP - 134
DO - 10.5220/0002104901260134