1. Introduction
E-commerce is a prevalent feature of modern society, notably in countries like the United States and China, where it constitutes a significant portion of daily consumer purchases [
1]. Mainstream e-commerce platforms incorporate reputation systems, which play a crucial role in guiding consumers’ decision-making [
2]. By enabling users to appraise and critique sellers upon their encounters, these systems provide invaluable perspectives on the quality of products and services. This nurtures trust and mitigates the ambiguities associated with virtual transactions. These assessments serve as instrumental aids for prospective purchasers. However, a notable challenge emerges. Sellers and buyers frequently maintain profiles on several platforms, and the absence of a holistic reputation system that amalgamates feedback from diverse sources hinders a comprehensive grasp of a seller’s reliability. This cross-platform reputation synchronization deficit could compromise a consumer’s capacity to make astute buying judgments [
3]. Therefore, there is a need for a reputation-sharing system based on multiple platforms in the e-commerce industry.
In addition, existing reputation systems face challenges such as privacy breaches, linkability, and multiple rating attacks. Feedback data may unintentionally expose user information privacy as they reveal the buyer’s identity and preferences, which can prevent a large number of users from providing their rating. Specifically, malicious actors can use data analysis and machine learning techniques to mine user’s private information from rating data [
4,
5], posing a serious threat to user security and trust. For example, data analysts or hackers can use machine learning techniques to analyze rating data and purchase history, identify specific users’ identities, and infer their purchasing preferences and consumption habits. Therefore, it is imperative to design a reputation system that achieves cross-platform reputation sharing while protecting user privacy.
A conventional approach in multi-platform reputation systems involves the deployment of a trusted third-party institution for managing users’ reputation data, giving rise to numerous centralization-related issues. Centralized systems, prone to single-point-of-failure problems, are vulnerable to attacks and operational failures [
6]. Furthermore, centralized systems’ data and authority amalgamation may precipitate power misuse, censorship, and data leakage risks [
7]. Simultaneously, the central node’s processing capabilities limit the scalability and performance of centralized systems, thereby stunting system advancement [
8]. In contrast, decentralized systems provide higher resilience, security, and transparency through distributed architecture [
9].
Blockchain technology, specifically consortium blockchain, promises potential solutions to these issues with its inherent advantages in reputation sharing and privacy protection [
10]. However, blockchain’s anonymity does not guard against linkability and multiple rating attacks. The term “Linkability” refers to the possibility of malicious users linking two pieces of information based on historical rating data. “Multiple rating attacks” occur when a single purchase record is rated in an e-commerce system more than once [
11].
1.1. Motivation
In mainstream e-commerce frameworks, enterprises’ confidentiality is often compromised, necessitating the revelation of specifics like their business identity and location. With such transparency, consumers can make informed decisions and establish trust with merchants. However, ensuring consumers’ privacy is paramount in online transactions. There is growing concern among consumers about the safety of their privacy data. This concern indicates that confidence in online shopping platforms could erode if adequate measures are not in place to protect their privacy. Such concerns are particularly pronounced within reputation mechanisms. Here, potential buyers rely on insights and feedback from previous customers to judge a seller’s trustworthiness. If privacy is not maintained, consumers might hesitate to engage with these reputation systems or even refrain from transacting on the platform.
Unlinkability is a higher requirement for privacy protection. In
Figure 1, Alice provides ratings after purchasing medications on platforms A and B. These ratings entered the e-commerce reputation system, assessing the seller’s service and product quality. However, sellers and malicious actors may mine the potential associations of these ratings through manual or data analysis and machine learning methods. Consequently, consumers might worry about personal information security; people might choose silence and discontinue publishing their evaluations, weakening the e-commerce reputation system.
Given the above, our research aims to devise a solution addressing the following challenges:
Multi-platform Reputation Sharing: Our core objective is enabling reputation sharing across multiple e-commerce platforms. In today’s segmented digital marketplace, consumers navigate various independent systems, each with unique reputation mechanisms. The absence of a standard reputation system makes it harder for sellers to build trust and complicates the buying process for consumers. We envisage a unified, comprehensive reputation management approach for multi-platform reputation sharing.
Full Anonymity and Rating Validity Verification: Full anonymity in the reputation system implies that the user’s personal information remains anonymous to unrelated users, platform administrators, and sellers. Ensuring full anonymity presents a challenge to the validity of ratings: how can one ascertain the legitimacy of anonymous users?
Unlinkability: Unlinkability serves as a safeguard to protect users from potential exploitation. We aim to create a system that effectively prevents malicious entities from linking two different pieces of information (rating records) together using historical data, thus safeguarding users from potential targeted attacks.
Prevention of multiple rating attacks: Our system will prevent users from rating repeatedly upon the same purchase record, thereby avoiding the possibility of distorting reputation scores.
It is crucial to note that our architectural framework does not guarantee sellers’ privacy. Buyers need access to sufficient information to assess the seller’s reputation, mirroring real-world situations.
1.2. Contributions
We propose ARS-Chain, a multi-platform reputation-sharing system based on a consortium blockchain, to address the outlined challenges. E-commerce platforms act as blockchain nodes in ARS-Chain to maintain a distributed ledger through consensus mechanisms. Buyers remain anonymous to sellers, platform administrators, and other users during the evaluation process, utilizing a one-time pseudonym for each evaluation. The system provides unlinkability of evaluation records through one-time pseudonyms, allowing users to participate in evaluations with peace of mind. Furthermore, the system prevents users from repeating their evaluation behavior.
Our research contributes to the body of knowledge in the following ways:
- (1)
This research proposes ARS-Chain, a novel blockchain-based anonymous reputationsharing system for e-commerce platforms. It is designed to foster reputation sharing among multiple platforms, providing buyers with global reputation data regarding sellers.
- (2)
This research outlines the design of a new dynamic ring addition mechanism in the linkable ring signatures scheme where the quantity of rings dynamically increases over time. The dynamic ring addition mechanism reduces the LRS group size to a small scale. In addition, the link tags are meticulously constructed using rings and item identifiers. These combined enhancements enable ARS-Chain to achieve full anonymity, unlinkability of rating records, and to resist multiple rating attacks.
- (3)
This research also involved conducting validity and performance experiments to evaluate the system. The validity experiments demonstrate that ARS-Chain achieves its design goals of anonymity, unlinkability, and prevention of multiple rating attacks. The performance experiments show that the system performs well in terms of runtime, memory consumption, and network overhead under our dynamic ring addition mechanism.
2. Related Work
Early research on reputation systems centered on single-platform or centralized models. Blömer [
12] leveraged group signatures in designing a reputation management system specific to a single platform. Bethencourt et al. [
13] introduced a unique cryptographic primitive termed ‘reputation signature’. The reputation signature allows for the efficient proof and verification of reputation without disclosing the user’s identity. Zhai et al. [
14] introduced ‘AnonRep’, a system that integrates cryptographic primitives like verifiable shuffle, linkable ring signatures, and homomorphic encryption to streamline reputation calculation, updating, and verification.
Many researchers introduce decentralized technology or blockchain technology to reputation management. PrivBox [
15], a decentralized reputation system, harnesses homomorphic encryption and zero-knowledge proofs to safeguard user privacy during online transactions. It eliminates the need for trusted intermediaries or user groups in processing feedback scores.
Attempts have been made to design reputation-sharing systems suitable for specific scenarios. Grinshpoun et al. [
16] unveiled models allowing users to migrate their reputation scores between virtual communities based on trust and similarity metrics. Shen et al. [
17] constructed a training model for privacy-preserving support vector machines, allowing reputation score sharing without compromising user identity. Wang et al. [
18] utilized blockchain for cross-domain reputation sharing, introducing personalized tags as quality indicators. In our previous work, RS-chain [
19] used a trusted execution environment (TEE) to ensure reputation integrity during reputation-sharing processes. Despite these strides, existing solutions often neglect challenges like anonymity, unlinkability, and the threat of multiple rating attacks. RepChain [
11] and this paper are the closest in addressing the issues mentioned above while focusing on reputation sharing across multiple platforms.
Researchers have looked into how blockchain-based applications can preserve user privacy. Comparing blockchain-based privacy protection reputation systems with traditional reputation systems, Hasan et al. [
20] emphasized the benefits of the blockchain-based privacy-preserving reputation system, including its immutability, transparency, and trustlessness. X. Li et al. [
21] presented a blockchain privacy protection system based on ring signatures. Utilizing ring signatures on elliptic curves, the author created a private data storage system that guarantees user identification and data security in blockchain applications. The BPP [
22] combined blockchain and public key encryption techniques to achieve secure data sharing, data retrieval, and data access while ensuring the interests of users and the correctness of query results. Han et al. [
23] introduced a privacy protection scheme for personal credit score calculation based on zero-knowledge proof, which considered the authenticity verification of multi-dimensional user data and proposed a universal verification platform based on blockchain. Wu et al. [
24] proposed an efficient and privacy-preserving traceable attribute-based encryption scheme, which used blockchain technology to ensure the integrity and non-repudiation of data. Casino and Patsakis [
25] used a decentralized locality-sensitive hashing classification and a series of recommendation methods to improve the efficiency and accuracy of the reputation system. These studies provided us with inspiration for designing a blockchain-based reputation-sharing framework in terms of privacy protection. However, these works did not address the issue of reputation sharing in multi-platform e-commerce scenarios, which is the main focus of our work.
Our work aims to design a reputation-sharing framework across multiple platforms, providing support for decentralization, anonymity, unlinkability of ratings, and prevention of multiple rating attacks. As shown in
Table 1, most existing works only focus on a subset of the design goals. RepChain [
11] is the closest to our work, but RepChain uses a combination of techniques such as blind signatures, zero-knowledge range proofs, secure multi-party computation, and consensus hashing, which is far more complex than our work.
3. Preliminaries
This section briefly revisits two pivotal technologies: consortium blockchain and linkable ring signatures.
3.1. Consortium Blockchain
A consortium blockchain [
26] is a semi-decentralized blockchain architecture maintained by a selected group of nodes, typically organizational or corporate entities, regulated through strict permission controls. Compared to public blockchains, consortium blockchains are suitable for scenarios requiring high trust and permission management, such as supply chain management, financial services, and cross-organizational data exchange. Consortium blockchain F can be defined as an ordered triplet
F = (
N,
T,
P), where:
N encapsulates the ensemble of nodes within the network.
T represents the aggregation of transactions.
P denotes a set that spells out permissions or governing rules.
Given its semi-decentralized essence, consortium chains are particularly apt for applications like supply chain management, financial services, and cross-organizational data exchange, aligning seamlessly with the objectives of this research. Within the realm of consortium blockchains, Byzantine Fault Tolerance (BFT) or its pragmatic variant, Practical Byzantine Fault Tolerance (PBFT), often emerge as the consensus algorithms of choice [
27].
3.2. Linkable Ring Signatures
Linkable ring signatures (LRS) [
28,
29] are a fascinating cryptographic scheme that enables users to sign anonymously yet traceably. This system endows a user with the capability to append an anonymous signature amidst a set of users (i.e., a “ring”), all the while ensuring that a singular user does not produce multiple distinct signatures. Unlike classical ring signatures [
30], linkable variants possess a salient attribute: should a user sign the same information multiple times, these signatures can be intricately linked. In this work, buyers use LRS to sign ratings when evaluating sellers or products, and the verifiers (sellers or other users) cannot identify the signer from the signature, thus protecting the signer’s privacy. Additionally, if the signer makes two ratings based on the same purchase, the second rating will be recognized by the verifier and discarded by the system. LRS primarily includes the following four algorithms:
1. Key Pair Generation Algorithm: A key pair, delineated as (
SK,
PK), is composed of a private key,
SK, intertwined with its public counterpart,
PK.
where
KeyGen() is the cryptographic key-generating function.
2. Signature Generation Algorithm: As a ring member, a signer orchestrates the signing operation.
wherein:
σ stands as the signature.
SK is the signer’s private key.
R is the ring, characterized by n public keys {, , …, }.
m is the message awaiting its signature.
T is the link tag.
Sign() functions as the signing procedure.
3. Signature Verification Algorithm: The outcome of the signature verification function can either be 1, signifying the legitimacy of the signature and the signer’s membership in the ring, or 0, denoting its rejection.
4. Linkability Verification Algorithm: The
Link() function, assessing linkability, ingests two signatures,
and
, and exudes a Boolean output, indicating whether these signatures come from the same signer and are based on the same link tag.
4. ARS-Chain Overview
This section presents the system architecture, threat model, and security assumptions.
4.1. System Architecture
ARS-Chain is a reputation-sharing framework designed for multiple e-commerce platforms, consisting of two parts: e-commerce platforms and blockchain, as shown in
Figure 2.
The platforms are e-commerce websites that join the ARS-Chain framework, such as Amazon. They provide online services for consumers and merchants. In order to provide more comprehensive reputation queries for users, the e-commerce platforms apply to join the ARS-Chain reputation system from a certificate authority (CA). The CA is an e-commerce business association jointly created by all platforms. The CA generates system parameters and encryption keys for users and platforms.
Users: In ARS-Chain, users are categorized into two main groups: buyers and sellers. Acting as the raters, the buyers enjoy the cloak of privacy conferred by the system. Conversely, the sellers, acting as the ratees, have openly disclosed information. In the ARS-Chain ecosystem, both buyers and sellers have the latitude to navigate freely among multiple platforms. Buyers furnish the system with evaluative feedback concerning the sellers.
Rating: Upon receipt of the merchandise, the buyer finalizes his seller rating. The rating should be a real number between a range [low, high], for the sake of conciseness in this study, dichotomized into two distinct values: “+1” or “−1”. After formulating this assessment, the buyer employs the linkable ring signatures methodology to sign the ratings. These signed messages are then dispatched to the proximate node in the system.
Blockchain Network Configuration: The blockchain in ARS-Chain is a consortium chain, similar to Hyperledger Fabric [
31], maintained by several e-commerce platforms. Each block stores rating transactions in the system.
Nodes: Constituted by servers from various platforms, nodes are vested with the responsibility of aggregating ratings uploaded by buyers, and they also participate in the blockchain consensus mechanism. During the consensus-building phase, each node has the potential to become a consensus node. Consensus nodes are tasked with the duty of block packaging. It should be noted that, in order to ensure the security of the consortium blockchain, it is usually required that at least a sufficient number of consensus nodes participate in the consensus process. Considering this, an e-commerce platform needs to provide multiple servers as blockchain nodes.
Consensus protocol: In alignment with industry consensus, as cited in [
27], ARS-Chain adopts the Practical Byzantine Fault Tolerance Algorithm (PBFT) as its consensus protocol.
Rating transactions: The nodes use the signature verification algorithm and the linkability verification algorithm of the linkable ring signature to verify the ratings. The ratings that pass the verifications are valid, called rating transactions, which will be packaged into the blockchain.
4.2. Threat Model and Assumptions
The adversaries in the system encompass troublemakers, malicious sellers, malicious buyers, and platform administrators.
(1) Troublemakers: These entities possess an inherent desire to trace sensitive data from other users, such as purchase records of buyers and evaluative feedback given to sellers, and subsequently link these bits of information together.
(2) Malicious Sellers: Upon receipt of negative reviews, these sellers become increasingly inquisitive about the source, prompting them to transform into system adversaries in their quest for identification.
(3) Malicious Buyers: Motivated by excessive admiration or significant disapproval, such buyers might submit redundant ratings.
(4) Platform Administrators: There exists a potential for platform stewards to compromise sensitive platform data for monetary gains [
32,
33]. While platform investors find such actions deeply concerning, regrettably, these occurrences are not uncommon in reality.
ARS-Chain stands as a system that fosters reputation sharing across multiple platforms. In this ecosystem, the accounts of ratees (sellers) across varying platforms should possess linkability. We postulate that sellers must employ uniform metadata for the registration process when they register on diverse platforms. For corporate sellers, their official registration certificate is deemed viable. ARS-Chain commits to protecting buyer-centric information, sidelining seller privacy—a stance harmonious with prevailing e-commerce platform conventions. We assume that cryptographic tools such as hash functions, key distribution, and signature schemes are secure, and the protection of these tools is beyond the scope of this study. Further, we believe that users are adept at safeguarding their private keys while their public counterparts can be freely disclosed.
5. ARS-Chain System Design
In this section, we elucidate the intricacies of the ARS-Chain system design, encompassing the dynamic ring addition LRS Scheme, link tag construction, and the system’s operational workflow.
5.1. Dynamic Ring Addition Mechanism
We propose a dynamic ring addition mechanism for the LRS scheme in the ARS-Chain. The scheme entails dynamically constructed rings to provide buyers anonymity while forestalling duplicate ratings and ensuring execution efficiency. Under this scheme, buyers are orchestrated into a ring of size
n, predicated on their purchasing sequence. As illustrated in
Figure 3, each signature ring should comprise
j consensus nodes, one buyer, and
k sellers. When a buyer acts as a signer to rate a review, the other members in the ring become verifiers of the signature. The ring
R can be articulated as follows:
Herein,
item_id denotes the item number,
i represents the
ith signature ring under the item number
item_id,
is the public key of the seller of the item numbered
item_id, and the set
encompasses the public keys of the
k buyers of the item numbered
item_id.
CN represents a collection of the consensus nodes’ public keys, defined as follows:
The consensus nodes are j nodes .
The dynamic ring addition LRS scheme, as illustrated in
Figure 4, shows that with
n = 100 and
j = 10, the number of buyers within the ring, denoted as
k, is evaluated as
k = n − j − 1 = 89. In this model, the purchasers of the item numbered
item_id are allocated into distinct signature rings based on the purchase order: buyers 1 to 89 formulate ring 1, buyers 90 to 178 formulate ring 2, and so on. The benefit of the dynamic ring addition LRS scheme is that it divides large-scale e-commerce transactions into smaller signature rings, thereby reducing the computational overhead within the ring.
5.2. Link Tag Construction
Link tag [
29,
34] in LRS addresses issues within ring signatures, such as double-spending or repeated signing. The system can identify whether the same entity has signed multiple times by employing link tags, thereby thwarting malicious activities. The computation formula for the link tag is delineated as follows:
where
is a collection of public keys from n members as defined in
Section 5.1, and
item_id denotes the item identifier. The
item_id is constituted of the platform name and an internal number. For instance, the
item_id for a product with ASIN code “
B08L8KC1J7” on Amazon can be represented as “
Amazon-B08L8KC1J7”. The ASIN code is a unique identifier generated for each product by Amazon, autonomously created by the Amazon system without the need for seller input. The uniqueness of
and
culminates in the uniqueness of the link tag, wherein the system will detect multiple signatures under the same
item_id by the same entity.
Regarding cases of repurchase, as long as the time interval between two purchases is sufficiently long, the buyer will appear in two distinct rings for the same item. Due to the difference in link tag, both ratings will still be regarded as valid by the LRS system. An extreme scenario is when a buyer purchases the same item twice within a short time and can only provide one rating.
5.3. Workflows
As illustrated in
Figure 5, the ARS-Chain system’s workflows encompass a collection of sub-processes involving multiple stakeholders, including buyers, sellers, and consensus nodes.
Initialization Phase:
① Key Generation: Each buyer x generates a pair of private and public keys (, ) based on the the KeyGen() algorithm.
② Dynamic Ring Formation: The system constructs a ring
for the product identified by
item_id, where
i is the ring identifier. According to the definition in
Section 5.1, the ring
consists of
k buyers,
j consensus nodes, and a seller.
③ Generation of One-time Pseudonyms: One-time pseudonyms are meaningless to the members within the ring and do not serve as inputs for the
Verify() and
Link() functions. The one-time pseudonym acts as a part of the rating information
m to identify the rater, denoted as “
from”. Its calculation method is as follows:
Rating Submission Phase:
④ Rating Creation: Upon receipt of the product, the buyer generates the rating m.
⑤ Link Tag Construction: The buyer utilizes
and
item_id to generate the link tag (
T).
⑥ Signing: Buyer
x employs private key
,
, and
T to sign the rating
m.
T will be used as part of the signature data structure for future verification.
⑦ Transaction Upload: The buyer uploads the transaction
TX to the attached blockchain nodes. At this time, the transactions have not been verified by the nodes, and are placed into the local unverified transaction pool by the nodes.
TX is the data format after m has been signed, represented as:
Verification Phase:
⑧Transaction Legitimacy Verification: The consensus nodes verify the legitimacy of the collected transaction
TX. A return of 1 from
Verify() indicates the signature’s legitimacy, passing the verification.
⑨Transaction Linkability Check: According to
TX.item_id and
TX.i, the consensus nodes scan all rating transactions generated based on the same
, executing
Link() to check the linkability of
TX with other transactions.
Here, TX_now represents the transaction to be checked, while TX_others represents other rating transactions generated based on the ring . A consistent return of 0 from all calls to Link() indicates no repeated ratings by the same user under the same link tag, passing the check.
Blockchain Consensus Phase:
⑩Transaction Broadcast: Transactions that pass Verify() and Link() are regarded as legitimate transactions, placed into the transaction pool, and then broadcasted to other peers.
⑪ Block Generation and Linkage: Consensus nodes, adhering to the PBFT consensus protocol, reach a consensus to package the rating transactions into a new block and append the new block to the end of the blockchain. At this juncture, the seller’s reputation score is updated, and the buyers view the reputation score based on multi-platform global data.
6. Validity Analysis
This section analyzes whether the ARS-Chain system meets the design goals we proposed in
Section 1.1.
Multi-platform Reputation Sharing: ARS-Chain achieves this goal by storing reputation data in a consortium blockchain maintained by multiple platforms.
Full Anonymity and Evaluation Validity Verification: ARS-Chain uses linkable ring signature technology to achieve the signer’s anonymity to the seller, platform administrators, and other members within the ring. In addition, as shown in
Section 5.3, the system generates a one-time pseudonym for the user during the initialization phase. This helps to achieve the signer’s anonymity to outsiders. We conducted validity experiments in
Section 7.2 to test this design goal.
Unlinkable Rating Records: ARS-Chain ensures that the identity presented by the user in each rating is different by introducing one-time pseudonyms, thus ensuring that rating records are unlinkable. It should be noted that the linkability in LRS and the unlinkability in our design goals are not contradictory. The unlinkability in the design goals refers to the unlinkability between two different purchase records, while the linkability in LRS refers to the linkability between two ratings of the same purchase record.
Preventing Multiple Rating Attacks: ARS-Chain achieves this goal through our novel dynamic ring addition LRS scheme and link tag construction method. As shown in
Table 2, two legitimate ratings are based on different link tags. Conversely, two ratings based on the same link tag will be considered as multiple rating attacks. When the system detects repeated ratings, the second rating will be discarded. In addition, the experiments (
Section 7.2) shows that ARS-Chain effectively prevents multiple rating attacks.
Preventing Multiple Rating Attacks: ARS-Chain achieves this goal through our novel dynamic ring addition LRS scheme and link tag construction method. As shown in
Table 1, two legitimate ratings are based on different link tags. Conversely, two ratings based on the same link tag will be considered as multiple rating attacks. When the system detects repeated ratings, the second rating will be discarded. In addition, the experiments (
Section 7.2) shows that ARS-Chain effectively prevents multiple rating attacks.
Sybil attacks: In ARS-Chain, the blockchain stores reputation information and does not compete for control over user accounts with e-commerce platforms. We assume that e-commerce platforms can resist Sybil attacks through measures such as real-name authentication, and ARS-Chain is responsible for anonymizing real-name accounts during the process of reputation data being put on the blockchain.
7. Experiments and Evaluation
The primary algorithms encompassed within the framework of LRS consist of three pivotal components: signature generation, signature verification, and linkability verification. To assess the performance metrics of these algorithms, we conducted empirical evaluations in three areas: runtime, memory consumption, and signature size. Both runtime and memory consumption are indicative parameters for gauging the computational burden imposed on user hardware. The signature constitutes a seminal factor contributing to blockchain network communication overhead. Recognizing that the performance of LRS is intricately correlated with the LRS group size, our experimental framework was judiciously executed under both large-scale (100–5000 members) and small-scale (<100 members) LRS group sizes. It should be pointed out that the dynamic ring addition LRS scheme described in
Section 5.1 transforms the large-scale group size LRS, corresponding to large-scale e-commerce transactions, into small-scale group size LRS, corresponding to small-scale e-commerce transactions. In actuality, the LRS within ARS-Chain operates under the small-scale group size condition.
7.1. Experimental Setup
Parameters Configuration. Unsigned blockchain transactions (the rating from buyer to seller) are delineated as follows:
const m = {
timestamp: “May-19-2023 08:17:35 AM +UTC”,
from: “0x1114c78d5de672996d812dc2e1a05b5f33eacdfb”,
to: “0x000000d40b595b94918a28b27d1e2c66f43a51d3”,
value: “+1”
};
In this structure, the “timestamp” signifies the initiation time of the blockchain transaction, which concurrently serves as the moment at which the buyer rates the seller. The “from” field represents the rater’s one-time pseudonym. Adopting this one-time pseudonym obfuscates the evaluator’s identity, impeding malicious actors from tracking evaluations. Furthermore, the ‘to’ field distinctly identifies the seller, while the ‘value’ parameter denotes the appraisal score. Given the structural confines of our model, this score is rigorously limited to the binary choices of “+1” or “−1”.
The item identifier is configured as a string similar to “Amazon-B08L8KC1J7”, representing a product from Amazon.
Hardware Specifications. For the empirical analysis, we conducted our experiments on a machine equipped with an Intel® Core™ i5-7300HQ CPU @ 2.50 GHz, 8.0 GB of memory, running Windows 10.
Experimental Framework. Our experimental framework is implemented in two programming languages, PureScript and JavaScript, each catering to distinct aspects of the LRS algorithm. More specifically, the framework is partitioned into the following modules: (1) PureScript Component: This segment takes on the onus of actualizing the core logic of the LRS algorithm, encompassing key pair generation, message signing, signature verification, and linkability verification. The code for this module is encapsulated in approximately 300 lines of PureScript statements and further augmented by a plethora of PureScript library references. (2) JavaScript Component: This section serves as interface calls and benchmarking. The JavaScript component consists of about 400 lines of code.
7.2. Validity Experiments
As described in
Section 1.1, the design goal of ARS-Chain is to achieve anonymity, unlinkability and prevent multiple rating attacks while sharing reputation across multiple platforms. We introduce the validity experiments in this section.
In LRS,
Verify() returns “
true” to indicate that the signature is valid, i.e., the signer belongs to the signature ring, and
Link() returns “
true” to indicate that the two signatures are signed by the same signer under the same link tag, i.e., the system detects that the user rated multiple times. As shown in
Table 3, ARS-Chain correctly judged the legitimacy of the users and successfully detected the multiple ratings. When the system detects multiple ratings, the second rating will be discarded, thus avoiding the multiple rating attack. The experiments show that ARS-Chain effectively achieves legitimacy verification and prevents multiple rating attacks.
7.3. Performance Evaluation under Large-Scale LRS Group Size
The numbers of participants (n) in experiments under the large-scale LRS group size are 100, 200, 400, 800, 1200, 1600, 2400, 3200, and 5000, respectively.
The runtimes of signature generation, signature verification, and linkability verification algorithms increase with the number of participants, exhibiting an approximately linear relationship, as shown in
Figure 6. The runtimes of signature generation and verification are very close to each other and much larger than the runtimes of linkability. This indicates that signature generation and verification processes involve more computation, while the linkability verification algorithm is relatively simple.
As can be discerned from
Figure 7, several noteworthy patterns emerge in memory consumption across the three algorithms. In the signature generation algorithm, memory usage escalates as the number of participants increases; however, the trajectory of this increase does not strictly adhere to a linear pattern. In stark contrast, the memory utilization for the signature verification algorithm demonstrates considerable fluctuation across varying participant counts, defying any conspicuous systematic trend. For the linkability verification algorithm, it is apparent that the memory overhead is markedly lower compared to the other two algorithms, an attribute that may be due to its relative algorithmic simplicity.
Viewed holistically, the hierarchy of memory consumption from highest to lowest aligns well with the algorithms’ inherent code complexities. It is sequenced as follows: signature generation, signature verification, and linkability verification. Additionally, each algorithm manifests episodic spikes in memory usage, which are subsequently followed by a decrement. This oscillatory behavior could potentially be correlated with the garbage collection and optimization mechanisms intrinsic to the node.js runtime environment.
The signature constitutes a seminal factor contributing to blockchain network communication overhead.
Figure 8. shows a linear correlation between the signature size (
y) and the number of participants (
n). Mathematically, the best-fit function for the signature size (
y) and the number of participants (
n) can be expressed as follows:
Given these findings, managing the number of ring participants is necessary to ensure operational efficiency.
7.4. Performance Evaluation under Small-Scale LRS Group Size
In light of the observations presented in
Section 7.3, it becomes evident that large-scale LRS group size not only elongates the algorithm’s runtime but also inflates the communication overhead within the blockchain network. As a direct countermeasure, we introduce the dynamic ring addition mechanism described in
Section 5.1. The dynamic ring addition mechanism reduces the LRS group size to a small scale. In this section, we test the system performance when the LRS group size is small (less than 100).
Table 4 unequivocally elucidates that when the group size is curtailed to under 100, the signature size and the algorithmic runtime exhibit an incremental ascent in correlation with increasing group size. Although memory consumption generally trends upwards, it demonstrates a degree of irregularity, potentially attributable to the idiosyncrasies of the runtime environment’s memory garbage collection mechanisms. With a group size restricted to fewer than 100, all 3 performance metrics remain within the bounds of reduced overhead. Considering the ubiquitous flood-fill propagation characteristic inherent in blockchain systems, it is necessary to limit the byte size of transactions to be sufficiently small. We surmise that fixing the group size to less than 50 is optimal.
9. Conclusions and Future Work
This paper proposes ARS-Chain, a blockchain-based anonymous reputation-sharing system for e-commerce platforms. ARS-Chain utilizes a novel dynamic ring addition mechanism in the LRS scheme where the number of LRS rings increases over time based on the purchase list. In addition, we propose a practical method for constructing link tags with the LRS rings and item identifiers.
ARS-Chain addresses the critical challenges of enabling reputation sharing across platforms while protecting buyers’ privacy through anonymity and unlinkability of ratings. It prevents multiple rating attacks through the link tag mechanism. The experimental results confirm that ARS-Chain achieves its design goals, and the dynamic ring addition mechanism ensures the system’s performance.
The anonymous reputation systems have profound impacts on both social and ethical levels. Socially, they can promote more honest and transparent communication, but may also lead to a lack of accountability and misuse. Ethically, such systems could affect individual privacy rights and fairness. Therefore, future research should focus on how to balance anonymity with a sense of responsibility, ensuring that the design and implementation of these systems protect users’ rights while promoting the overall well-being of society.
For future work, we plan to extend our framework to support more complex and diverse reputation models, such as multi-dimensional, multi-faceted, and multi-level reputation. We also intend to explore the possibility of applying our framework to other domains that require anonymous and secure data sharing, such as healthcare, social networks, and IoT. Furthermore, we aim to conduct more comprehensive experiments and evaluations to demonstrate the effectiveness and efficiency of our framework in real-world scenarios.