學術產出-Theses

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

  • No doi shows Citation Infomation
題名 分散式環境中基於聲譽的信任度評估機制及其在智能合約之應用
Reputation-based Trust Evaluation Mechanism for Decentralized Environments and It’s Application Based on Smart Contracts
作者 詹琨泰
Chan, Kun-Tai
貢獻者 左瑞麟
Tso, Raylin
詹琨泰
Chan, Kun-Tai
關鍵詞 區塊鏈
去中心化
PGP
智能合約
小世界理論
信任度
Blockchain
Decentralized
PGP
Smart contract
The Small World Problem
Trust degree
日期 2017
上傳時間 2-Oct-2017 10:16:16 (UTC+8)
摘要 近年來區塊鏈技術及其相關應用成為熱門焦點,區塊鏈最大的特色包含去中心化以及匿名性等特性,然而在這樣的分散式網路中我們很難判斷對方是否值得信賴,在數位憑證中我們透過可信賴第三方擔任憑證中心為用戶簽發金鑰憑證以此建立用戶之間的信賴關係,但在區塊鏈此種分散式網路中找到一個可信賴第三方實屬不易,並且可能會與區塊鏈去中心化之特性背道而馳,因此本研究參考PGP信任網與小世界理論的概念,建立一套可適用於分散式環境中基於聲譽的信任度評估機制,並將此機制結合智能合約實現一個信任度評估機制購物平台,目的希望用戶與陌生人交易前,可透過此機制計算出信任度,提供用戶做為參考,幫助用戶更容易判斷陌生人是否可信,以降低受騙風險。
In recent years, the blockchain technology and its relevant applications become hot spots. The greatest feature of the blockchain is the decentralization. Nonetheless, it is difficult for us to judge whether the other person get involved in the decentralized network is credible. Furthermore, it is difficult to find a reliable third party in such a point-to-point network. Consequently, this paper refers to the PGP web of trust and the small world problem to establish a set of reputation-based trust evaluation mechanism for decentralized environments, we combine this mechanism with a smart contract to achieve a trust evaluation mechanism shopping platform, It is expected that achievements of the paper can facilitate people’s judgment regarding the reliability of strangers and reduce the risks of being deceived.
參考文獻 [1] Garfinkel, S. (1995). PGP: pretty good privacy. " O`Reilly Media, Inc."
[2] Zyskind, G., & Nathan, O. (2015, May). Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), 2015 IEEE (pp. 180-184). IEEE.
[3] Zhang, F., Cecchetti, E., Croman, K., Juels, A., & Shi, E. (2016, October). Town crier: An authenticated data feed for smart contracts. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security(pp. 270-282). ACM.
[4] Travers, J., & Milgram, S. (1967). The small world problem. Phychology Today, 1, 61-67.
[5] Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.
[6] Andrychowicz, M., Dziembowski, S., Malinowski, D., &Mazurek, L. (2014, May). Secure multiparty computations on bitcoin. In Security and Privacy (SP), 2014 IEEE Symposium on (pp. 443-458). IEEE.
[7] Li,Y. M., Chen, J. C.,&Li, T. Y.(2007, May). A Blog System with Trust Mechanism.18th International Conference on Information Management.
[8] Meng, X. F., Zhang, L., & Wang, X. (2009). Research on trust model of P2P electronic commerce [J]. Application Research of Computers, 8, 077.
[9] Qiao, X. Q., Yang, C., Li, X. F., & Chen, J. L. (2011). A trust calculating algorithm based on social networking service users` context. JisuanjiXuebao(Chinese Journal of Computers), 34(12), 2403-2413.
[10] Gao,Y.,&Yuan, Y. (2014). The Research on Global Trust Algorithm Based on Social Network.from: http://www.paper.edu.cn.
[11] 許鑫, &翟曉娟. (2008). 信任度計算與信任傳遞協議設計的研究. 現代
圖書情報技術, 24(3),(pp. 32-39).
[12] Recommendation-for-Key-Management-Part1: General ,
from:http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf
[13] 智能合約-MBA智庫百科,
from:http://wiki.mbalib.com/zh-tw/%E6%99%BA%E8%83%BD%E5%90%8
8%E7%BA%A6
[14] Facebook research,
from: https://research.fb.com/three-and-a-half-degrees-of-separation/?hc_
location=ufi
[15]Heineman, G. T., Pollice, G., &Selkow, S. Algorithms in a Nutshell, Oreilly
Media. ISBN 978-0-596-51624-6.
[16] Stallings, W., &Tahiliani, M. P. (2014). Cryptography and network security:
principles and practice (Vol. 6). London: Pearson.
[17]結城浩.(2011). 密碼學與網路安全應用.旗標出版股份有限公司.
[18]林展民.(2016). 以智能合約實現快速醫療保險理賠.國立政治大學資訊
科學系碩士論文.
描述 碩士
國立政治大學
資訊科學學系
104753006
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0104753006
資料類型 thesis
dc.contributor.advisor 左瑞麟zh_TW
dc.contributor.advisor Tso, Raylinen_US
dc.contributor.author (Authors) 詹琨泰zh_TW
dc.contributor.author (Authors) Chan, Kun-Taien_US
dc.creator (作者) 詹琨泰zh_TW
dc.creator (作者) Chan, Kun-Taien_US
dc.date (日期) 2017en_US
dc.date.accessioned 2-Oct-2017 10:16:16 (UTC+8)-
dc.date.available 2-Oct-2017 10:16:16 (UTC+8)-
dc.date.issued (上傳時間) 2-Oct-2017 10:16:16 (UTC+8)-
dc.identifier (Other Identifiers) G0104753006en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/113293-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊科學學系zh_TW
dc.description (描述) 104753006zh_TW
dc.description.abstract (摘要) 近年來區塊鏈技術及其相關應用成為熱門焦點,區塊鏈最大的特色包含去中心化以及匿名性等特性,然而在這樣的分散式網路中我們很難判斷對方是否值得信賴,在數位憑證中我們透過可信賴第三方擔任憑證中心為用戶簽發金鑰憑證以此建立用戶之間的信賴關係,但在區塊鏈此種分散式網路中找到一個可信賴第三方實屬不易,並且可能會與區塊鏈去中心化之特性背道而馳,因此本研究參考PGP信任網與小世界理論的概念,建立一套可適用於分散式環境中基於聲譽的信任度評估機制,並將此機制結合智能合約實現一個信任度評估機制購物平台,目的希望用戶與陌生人交易前,可透過此機制計算出信任度,提供用戶做為參考,幫助用戶更容易判斷陌生人是否可信,以降低受騙風險。zh_TW
dc.description.abstract (摘要) In recent years, the blockchain technology and its relevant applications become hot spots. The greatest feature of the blockchain is the decentralization. Nonetheless, it is difficult for us to judge whether the other person get involved in the decentralized network is credible. Furthermore, it is difficult to find a reliable third party in such a point-to-point network. Consequently, this paper refers to the PGP web of trust and the small world problem to establish a set of reputation-based trust evaluation mechanism for decentralized environments, we combine this mechanism with a smart contract to achieve a trust evaluation mechanism shopping platform, It is expected that achievements of the paper can facilitate people’s judgment regarding the reliability of strangers and reduce the risks of being deceived.en_US
dc.description.tableofcontents Chapter 1 Introduction 1
1.1 Research Motivation 1
1.2 Research Purpose 2
1.3 Research Contribution 2
1.4 Organization 3
Chapter 2 Background and Related Works 5
2.1 Digital Signatures 5
2.1.1 The Generation and Verification of Digital Signatures 5
2.2 Digital Certificate 7
2.2.1 Certificate Authority 7
2.2.2 Scenario of Issuing a Digital Certificate 8
2.3 Pretty Good Privacy (PGP) 10
2.3.1 Key Ring 11
2.3.1.1 Public Key Ring 11
2.3.1.2 Private Key Ring 13
2.3.2 PGP Web of Trust 13
2.3.2.1 Confirm the Public Key through User`s Own Digital Signature 14
2.3.2.2 Confirm the Public Key through the Person that User Fully Trust 14
2.3.2.3 Confirm the Public Key through the Person that User Marginally Trust 15
2.4 Elliptic Curve Cryptography 16
2.5 Blockchain 17
2.6 Smart Contract 18
2.7 The Small World Problem 20
2.8 Dijkstra Algorithm 21
2.9 Literatures Regarding the Calculation of Trust Degree 24
Chapter 3 Reputation-based Trust Evaluation Mechanism 28
3.1 Records of Trust Degree 28
3.2 Scenarios of Trust Evaluation 30
3.2.1 Scenario 1: Direct Relationship 31
3.2.2 Scenario 2: Indirect Relationship 34
3.2.3 Scenario 3: No Indirect Relationship 40
3.2.4 Scenario 4: New Seller 40
Chapter 4 System Implementation 41
4.1 Implementation and Simulation Testing of Trust Evaluation Mechanism 41
4.1.1 Implementation Environment 41
4.1.2 Simulation Testing 41
4.2 The Shopping Platform Composed of Smart Contract and Trust Evaluation Mechanism 46
4.2.1 Implementation Environment 46
4.2.2 System Architecture and Smart Contract 46
4.2.3 Operation Interface and Process Flow 51
4.3 Result and Discussion of Experiment 57
Chapter 5 Comparison of Trust Evaluation Mechanisms 59
5.1 The Characteristics of Our Mechanism 59
5.2 Comparison Results 60
Chapter 6 Conclusion 62
References 63
zh_TW
dc.format.extent 2508012 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0104753006en_US
dc.subject (關鍵詞) 區塊鏈zh_TW
dc.subject (關鍵詞) 去中心化zh_TW
dc.subject (關鍵詞) PGPzh_TW
dc.subject (關鍵詞) 智能合約zh_TW
dc.subject (關鍵詞) 小世界理論zh_TW
dc.subject (關鍵詞) 信任度zh_TW
dc.subject (關鍵詞) Blockchainen_US
dc.subject (關鍵詞) Decentralizeden_US
dc.subject (關鍵詞) PGPen_US
dc.subject (關鍵詞) Smart contracten_US
dc.subject (關鍵詞) The Small World Problemen_US
dc.subject (關鍵詞) Trust degreeen_US
dc.title (題名) 分散式環境中基於聲譽的信任度評估機制及其在智能合約之應用zh_TW
dc.title (題名) Reputation-based Trust Evaluation Mechanism for Decentralized Environments and It’s Application Based on Smart Contractsen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) [1] Garfinkel, S. (1995). PGP: pretty good privacy. " O`Reilly Media, Inc."
[2] Zyskind, G., & Nathan, O. (2015, May). Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), 2015 IEEE (pp. 180-184). IEEE.
[3] Zhang, F., Cecchetti, E., Croman, K., Juels, A., & Shi, E. (2016, October). Town crier: An authenticated data feed for smart contracts. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security(pp. 270-282). ACM.
[4] Travers, J., & Milgram, S. (1967). The small world problem. Phychology Today, 1, 61-67.
[5] Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.
[6] Andrychowicz, M., Dziembowski, S., Malinowski, D., &Mazurek, L. (2014, May). Secure multiparty computations on bitcoin. In Security and Privacy (SP), 2014 IEEE Symposium on (pp. 443-458). IEEE.
[7] Li,Y. M., Chen, J. C.,&Li, T. Y.(2007, May). A Blog System with Trust Mechanism.18th International Conference on Information Management.
[8] Meng, X. F., Zhang, L., & Wang, X. (2009). Research on trust model of P2P electronic commerce [J]. Application Research of Computers, 8, 077.
[9] Qiao, X. Q., Yang, C., Li, X. F., & Chen, J. L. (2011). A trust calculating algorithm based on social networking service users` context. JisuanjiXuebao(Chinese Journal of Computers), 34(12), 2403-2413.
[10] Gao,Y.,&Yuan, Y. (2014). The Research on Global Trust Algorithm Based on Social Network.from: http://www.paper.edu.cn.
[11] 許鑫, &翟曉娟. (2008). 信任度計算與信任傳遞協議設計的研究. 現代
圖書情報技術, 24(3),(pp. 32-39).
[12] Recommendation-for-Key-Management-Part1: General ,
from:http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf
[13] 智能合約-MBA智庫百科,
from:http://wiki.mbalib.com/zh-tw/%E6%99%BA%E8%83%BD%E5%90%8
8%E7%BA%A6
[14] Facebook research,
from: https://research.fb.com/three-and-a-half-degrees-of-separation/?hc_
location=ufi
[15]Heineman, G. T., Pollice, G., &Selkow, S. Algorithms in a Nutshell, Oreilly
Media. ISBN 978-0-596-51624-6.
[16] Stallings, W., &Tahiliani, M. P. (2014). Cryptography and network security:
principles and practice (Vol. 6). London: Pearson.
[17]結城浩.(2011). 密碼學與網路安全應用.旗標出版股份有限公司.
[18]林展民.(2016). 以智能合約實現快速醫療保險理賠.國立政治大學資訊
科學系碩士論文.
zh_TW