Method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment
First Claim
1. A method for preserving privacy of a reputation inquiry in a peer-to-peer computer networking communication environment with an inquiry handler, a response handler, a plurality of parties including at least one responder, an inquirer, an inquiry target, wherein the responder has a rating score that rates the inquiry target, the method comprising the steps of:
- generating an inquiry vector about the inquiry target, wherein the inquiry vector has a plurality of elements and the generating step is performed by the inquirer;
applying homomorphic encryption, by the inquirer, to each element of the inquiry vector and specifying a corresponding encryption key, thereby producing an encrypted inquiry, wherein the encryption key is known by the inquirer and is not known by the inquiry handler, the response handler, the inquiry target or the responder, the inquiry handler and the response handler being separate entities, thereby achieving a separation of duty between the inquiry handler and the response handler;
sending the encrypted inquiry, across a computer network, to the inquiry handler;
broadcasting the encrypted inquiry to the responder, wherein the broadcasting step is performed by the inquiry handler,identifying the response handler to the responder such that each responder can send a response to the response handler, the step of identifying the response handler being performed by the inquiry handler;
responding by raising each element of the encrypted inquiry vector by a power equal to the rating score, thereby generating a response to the inquiry, wherein the raising step is performed by the responder;
transmitting the responses, across a computer network, from the responder to the response handler;
producing a summary response, wherein the step of producing is performed by the response handler;
sending the summary response from the response handler to the inquirer; and
decrypting the encrypted summary response using a decryption key;
wherein the step of responding responds by constructing a rating vector make 13RV(RPi,i)=Ti×
RPi wherein RPi is a vector storing a rating score for each of the parties Pi, where Ti is a transformation matrix of size n2×
n for mapping RPi of size n×
1 to rating vector VPi of size n2×
1 with zero padding, and TiT =[Zn×
n(i−
1) In×
n Zn×
n(n−
i)]is composed of a zero matrix of size n×
n(i−
1), an identity matrix of size n×
n, and another zero matrix of size n×
n(n−
i), and then applying a response function make_Response(VPi, IVPk)=Π
j=1n×
n(kmj)vj, where vj is jth entry in the VPi, and kmj is the jth entry in IVPk, to raise each element of the encrypted inquiry vector by the power equal to the rating score.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment. The method allows peers using their own personal agents to obtain reputation information of each other through a pair of trustworthy mediator proxies. A mediator proxy is considered trustworthy if even when it is compromised it can guarantee three conditions: (1) the anonymity of the identity of the responders and the target being inquired; (2) the privacy of the content in an inquiry and a response; and (3) the boundary limit of the reputation summary with no possibility of combining the response of multiple inquiries to reverse engineer the reputation rating of an individual responder.
-
Citations
8 Claims
-
1. A method for preserving privacy of a reputation inquiry in a peer-to-peer computer networking communication environment with an inquiry handler, a response handler, a plurality of parties including at least one responder, an inquirer, an inquiry target, wherein the responder has a rating score that rates the inquiry target, the method comprising the steps of:
-
generating an inquiry vector about the inquiry target, wherein the inquiry vector has a plurality of elements and the generating step is performed by the inquirer; applying homomorphic encryption, by the inquirer, to each element of the inquiry vector and specifying a corresponding encryption key, thereby producing an encrypted inquiry, wherein the encryption key is known by the inquirer and is not known by the inquiry handler, the response handler, the inquiry target or the responder, the inquiry handler and the response handler being separate entities, thereby achieving a separation of duty between the inquiry handler and the response handler; sending the encrypted inquiry, across a computer network, to the inquiry handler; broadcasting the encrypted inquiry to the responder, wherein the broadcasting step is performed by the inquiry handler, identifying the response handler to the responder such that each responder can send a response to the response handler, the step of identifying the response handler being performed by the inquiry handler; responding by raising each element of the encrypted inquiry vector by a power equal to the rating score, thereby generating a response to the inquiry, wherein the raising step is performed by the responder; transmitting the responses, across a computer network, from the responder to the response handler; producing a summary response, wherein the step of producing is performed by the response handler; sending the summary response from the response handler to the inquirer; and decrypting the encrypted summary response using a decryption key; wherein the step of responding responds by constructing a rating vector make 13RV(RPi,i)=Ti×
RPi wherein RPi is a vector storing a rating score for each of the parties Pi, where Ti is a transformation matrix of size n2×
n for mapping RPi of size n×
1 to rating vector VPi of size n2×
1 with zero padding, and TiT =[Zn×
n(i−
1) In×
n Zn×
n(n−
i)]is composed of a zero matrix of size n×
n(i−
1), an identity matrix of size n×
n, and another zero matrix of size n×
n(n−
i), and then applying a response function make_Response(VPi, IVPk)=Π
j=1n×
n(kmj)vj, where vj is jth entry in the VPi, and kmj is the jth entry in IVPk, to raise each element of the encrypted inquiry vector by the power equal to the rating score.
-
-
2. A method for preserving privacy of a reputation inquiry in a peer-to-peer computer networking communication environment with an inquiry handler, a response handler, a plurality of parties including at least one responder, an inquirer, and an inquiry target, wherein the responder has a rating score that rates the inquiry target, the method comprising the steps of:
-
generating, by the inquirer, a first and second query vector about the inquiry target, with respective first and second elements, wherein the first query vector and the second query vector may be algebraically combined according to a predetermined algebraic operation to form an inquiry vector; applying homomorphic encryption to each first element and each second element of the first and second query vector and specifying a corresponding first and second encryption key, thereby producing a first and second homomorphically encrypted inquiry, wherein the first and second encryption keys are known by the inquirer and are not known by the response handler, the inquiry target or the responder, the inquiry handler and the response handler being separate entities, thereby achieving a separation of duty between the inquiry handler and the response handler; sending the first and second inquiry vectors across a computer network to the inquiry handler; broadcasting the first and second homomorphically encrypted inquiry to the responder, wherein the broadcasting step is performed by the inquiry handler; identifying the response handler to the responder such that each responder can send a response to the response handler, the step of identifying the response handler being performed by the inquiry handler; receiving, by the response handler, first and second responses from the responder which correspond to the first and second homomorphically encrypted inquiries, wherein the responder raised each element of the first and second homomorphically encrypted inquiry vector by a power equal to the rating score; producing, by the response handler, a first summary response corresponding to the first responses and a second summary response corresponding to the second responses; sending the first and second summary responses to the inquirer; and algebraically combining the first and second summary responses, by the inquirer, according to the predetermined algebraic operation to enable the inquirer to determine the rating score for the inquiry target as determined by the responder. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
Specification