{"id":"https://openalex.org/W2137604948","doi":"https://doi.org/10.1145/1655188.1655197","title":"A verifiable, centralized, coercion-free reputation system","display_name":"A verifiable, centralized, coercion-free reputation system","publication_year":2009,"publication_date":"2009-11-09","ids":{"openalex":"https://openalex.org/W2137604948","doi":"https://doi.org/10.1145/1655188.1655197","mag":"2137604948"},"language":"en","primary_location":{"id":"doi:10.1145/1655188.1655197","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1655188.1655197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM workshop on Privacy in the electronic society","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102985450","display_name":"Florian Kerschbaum","orcid":"https://orcid.org/0000-0003-4288-2286"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Florian Kerschbaum","raw_affiliation_strings":["SAP Research, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"SAP Research, Karlsruhe, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5102985450"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.7098,"has_fulltext":false,"cited_by_count":46,"citation_normalized_percentile":{"value":0.91303457,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"61","last_page":"70"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.8857735991477966},{"id":"https://openalex.org/keywords/coercion","display_name":"Coercion (linguistics)","score":0.7605721950531006},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.7301816344261169},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5692141056060791},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.562328577041626},{"id":"https://openalex.org/keywords/reputation-system","display_name":"Reputation system","score":0.4353730380535126},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.38586246967315674},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.10590526461601257},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.09426996111869812},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07142472267150879}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.8857735991477966},{"id":"https://openalex.org/C2777188754","wikidata":"https://www.wikidata.org/wiki/Q5140822","display_name":"Coercion (linguistics)","level":2,"score":0.7605721950531006},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.7301816344261169},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5692141056060791},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.562328577041626},{"id":"https://openalex.org/C2781218421","wikidata":"https://www.wikidata.org/wiki/Q2892532","display_name":"Reputation system","level":3,"score":0.4353730380535126},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38586246967315674},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.10590526461601257},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.09426996111869812},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07142472267150879},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1655188.1655197","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1655188.1655197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM workshop on Privacy in the electronic society","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.612.327","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.612.327","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.fkerschbaum.org/wpes09.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6100000143051147}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1491628041","https://openalex.org/W1496983640","https://openalex.org/W1528076390","https://openalex.org/W1529862094","https://openalex.org/W1537641088","https://openalex.org/W1538778386","https://openalex.org/W1544327602","https://openalex.org/W1597091047","https://openalex.org/W1604936042","https://openalex.org/W1610688607","https://openalex.org/W1650233843","https://openalex.org/W1892964986","https://openalex.org/W1916412195","https://openalex.org/W2006453614","https://openalex.org/W2027471022","https://openalex.org/W2033820870","https://openalex.org/W2063635907","https://openalex.org/W2086042811","https://openalex.org/W2092422002","https://openalex.org/W2097327009","https://openalex.org/W2098377677","https://openalex.org/W2105564033","https://openalex.org/W2112299885","https://openalex.org/W2112497966","https://openalex.org/W2120506990","https://openalex.org/W2128906841","https://openalex.org/W2132172731","https://openalex.org/W2135930857","https://openalex.org/W2146700948","https://openalex.org/W2159675343","https://openalex.org/W2164409696","https://openalex.org/W2165210192","https://openalex.org/W2166881289","https://openalex.org/W2169101582","https://openalex.org/W2253201849","https://openalex.org/W2337430557","https://openalex.org/W2611745827","https://openalex.org/W2913105718","https://openalex.org/W3030091766"],"related_works":["https://openalex.org/W2101139861","https://openalex.org/W1490117225","https://openalex.org/W2377621139","https://openalex.org/W2536010963","https://openalex.org/W4287550630","https://openalex.org/W3177404656","https://openalex.org/W3113485354","https://openalex.org/W2521518531","https://openalex.org/W2050024349","https://openalex.org/W2137604948"],"abstract_inverted_index":{"Reputation":[0],"systems":[1],"are":[2],"popular":[3],"tools":[4],"to":[5,32,38,82],"evaluate":[6,143],"the":[7,17,23,54,58,61,66,69,83,102,128,135],"trust-worthiness":[8],"of":[9,53,68,86,127,130],"an":[10,94],"unknown":[11],"party":[12],"before":[13],"a":[14,46,74,79,109,120,124,144],"transaction,":[15],"but":[16],"reputation":[18,47,146],"score":[19],"can":[20,115],"greatly":[21],"impact":[22],"rated":[24],"subject,":[25],"such":[26,112],"that":[27,49,113],"it":[28],"might":[29],"be":[30],"inclined":[31],"suppress":[33],"negative":[34],"ratings.":[35],"In":[36],"order":[37],"elicit":[39],"coercion-resistant,":[40],"honest":[41],"feedback,":[42],"this":[43,105],"paper":[44],"proposes":[45],"system":[48,63,111],"provides":[50],"complete":[51],"privacy":[52,129],"ratings,":[55],"i.e.":[56],"neither":[57],"ratee":[59],"nor":[60],"reputa-tion":[62],"will":[64],"learn":[65],"value":[67],"rating.":[70],"We":[71,100,133],"take":[72],"both,":[73],"cryptographic":[75,125],"as":[76,78],"well":[77],"non-cryptographic":[80],"approach,":[81],"problem.":[84],"Privacy":[85],"ratings":[87],"may":[88],"foster":[89],"bad":[90,98],"mouthing":[91],"attacks":[92],"where":[93],"attacker":[95],"leaves":[96],"intentionally":[97],"feedback.":[99],"limit":[101],"possibility":[103],"for":[104,149],"attack":[106],"by":[107],"providing":[108],"token":[110],"one":[114],"only":[116],"leave":[117],"feedback":[118],"after":[119],"trans-action,":[121],"and":[122,140,142],"provide":[123],"proof":[126],"our":[131],"system.":[132],"consider":[134],"Virtual":[136],"Organization":[137],"forma-tion":[138],"problem":[139],"develop":[141],"novel":[145],"aggregation":[147],"algorithm":[148],"it.":[150]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
