Skip to main content

Decentralized Polling with Respectable Participants

  • Conference paper
Principles of Distributed Systems (OPODIS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5923))

Included in the following conference series:

Abstract

We consider the polling problem in a social network where participants care about their reputation: they do not want their vote to be disclosed nor their misbehaving, if any, to be publicly exposed. Assuming this reputation concern, we show that a simple secret sharing scheme, combined with verification procedures, can efficiently enable polling without the need for any central authority or heavyweight cryptography.

More specifically, we present DPol, a simple and scalable distributed polling protocol where misbehaving nodes are exposed with a non-zero probability and the probability of dishonest participants violating privacy is balanced with their impact on the accuracy of the polling result. The trade-off is captured by a generic parameter of the protocol, an integer k we call the privacy parameter, so that in a system of N nodes with \(B<\sqrt{N}\) dishonest participants, the probability of disclosing a participant’s vote is bounded by (B/N)k + 1, whereas the impact on the polling result is bounded by (6k + 2) B.

We report on the deployment of DPolover 400 PlanetLab nodes. The polling result suffers a relative error of less than 10% in the face of message losses, crashes and asynchrony inherent in PlanetLab. In the presence of dishonest nodes, our experiments show that the impact on the polling result is (4k + 1) B on average, consistently lower that the theoretical bound of (6k + 2) B.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kremsa Design, Inc. Facebook Poll, http://www.facebook.com/apps/application.php?id=20678178440

  2. Benaloh, J.C.: Secret sharing homomorphisms: Keeping shares of a secret secret. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 251–260. Springer, Heidelberg (1987)

    Google Scholar 

  3. Castro, M., Liskov, B.: Practical Byzantine Fault Tolerance and Proactive Recovery. TOCS 20(4), 398–461 (2002)

    Article  Google Scholar 

  4. Delporte-Gallet, C., Fauconnier, H., Guerraoui, R., Ruppert, E.: Secretive birds: Privacy in population protocols. In: Tovar, E., Tsigas, P., Fouchal, H. (eds.) OPODIS 2007. LNCS, vol. 4878, pp. 329–342. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Doodle: Easy Scheduling, http://www.doodle.com

  6. Malkhi, D., Margo, O., Pavlov, E.: E-Voting without ‘Cryptography’. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 1–15. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Malkhi, D., Pavlov, E.: Anonymity without ‘Cryptography’. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 108–126. Springer, Heidelberg (2002)

    Google Scholar 

  8. Rabin, T., Ben-Or, M.: Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. In: STOC, pp. 73–85 (1989)

    Google Scholar 

  9. Richmond, R.: Facebook Tests the Power of Democracy, April 23 (2009)

    Google Scholar 

  10. Rivest, R., Shamir, A., Tauman, Y.: How to Share a Secret. CACM 22, 612–613 (1979)

    Google Scholar 

  11. Rivest, R., Smith, W.: Three Vvoting Protocols: ThreeBallot, VAV, and twin. In: EVT, p. 16 (2007)

    Google Scholar 

  12. Stelter, B.: Facebook’s Users Ask Who Owns Information, February, 17 (2009)

    Google Scholar 

  13. Yu, H., Gibbons, P., Kaminsky, M., Xiao, F.: SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In: SP, pp. 3–17 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Guerraoui, R., Huguenin, K., Kermarrec, AM., Monod, M. (2009). Decentralized Polling with Respectable Participants. In: Abdelzaher, T., Raynal, M., Santoro, N. (eds) Principles of Distributed Systems. OPODIS 2009. Lecture Notes in Computer Science, vol 5923. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10877-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10877-8_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10876-1

  • Online ISBN: 978-3-642-10877-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics