Advertisement

Incentive-Compatibility in a Distributed Autonomous Currency System

  • Kenji Saito
  • Eiichi Morino
  • Jun Murai
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4118)

Abstract

Peer-to-peer complementary currencies can be powerful tools for promoting exchanges and building sustainable relationships among selfish peers on the Internet.

i-WAT[1] is a proposed such currency based on the WAT System, a polycentric complementary currency using WAT tickets as its media of exchange. Participants spontaneously issue and circulate the tickets as needed, whose values are backed up by chains of trust. i-WAT implements the tickets electronically by exchanging messages signed in OpenPGP.

This paper claims that the design of i-WAT is incentive-compatible as to protection against moral hazards, or threats caused by selfish peers because they may take advantage of the rules; such hazards are defused in i-WAT if the participants react against misbehaviors of others by pursuing their own benefits.

A reference implementation of i-WAT has been developed in the form of an XMPP instant messaging client. We have been putting the currency system into practical use since June 2004.

Keywords

Trust Model Moral Hazard Game Tree Reference Implementation Empty Promise 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Saito, K.: Peer-to-peer money: Free currency over the Internet. In: Chung, C.-W., Kim, C.-k., Kim, W., Ling, T.-W., Song, K.-H. (eds.) HSI 2003. LNCS, vol. 2713. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Feigenbaum, J., Shenker, S.: Distributed algorithmic mechanism design: Recent results and future directions. In: Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communication (DIALM 2002) (2002)Google Scholar
  3. 3.
    Schwarz, F.: Das experiment von Wörgl, Hypertext document (1951), Available electronically at: http://userpage.fu-berlin.de/~roehrigw/woergl/
  4. 4.
    Seron, S.: (Local Exchange Trading Systems 1 - Creation And Growth Of Lets) Hypertext document, Available electronically at: http://www.gmlets.u-net.com/resources/sidonie/home.html
  5. 5.
    Glover, P.: (Ithaca Hours Online) Hypertext document, Available electronically at: http://www.ithacahours.com/
  6. 6.
    watsystems.net: (WATSystems home page) Hypertext document, Available electronically at: http://www.watsystems.net/
  7. 7.
    Saito, K., Morino, E., Murai, J.: Reduction over time: Easing the burden of peer-to-peer barter relationships to facilitate mutual help. In: Proceedings of the Second International Workshop on Computer Supported Activity Coordination (CSAC 2005) (2005)Google Scholar
  8. 8.
    Saito, K., Morino, E., Murai, J.: Multiplication over time to facilitate peer-to-peer barter relationships. In: Proceedings of the 2nd International Workshop on P2P Data Management, Security and Trust (PDMST 2005) (2005)Google Scholar
  9. 9.
    Saito, K.: WOT for WAT: Spinning the web of trust for peer-to-peer barter relationships. In: IEICE Transactions on Communication, The Institute of Electronics, Information and Communication Engineers (2005)Google Scholar
  10. 10.
    Saito, K.: Maintaining trust in peer-to-peer barter relationships. In: Proceedings of 2004 Symposium on Applications and the Internet (SAINT 2004 Workshops). IEEE Computer Society Press, Los Alamitos (2004)Google Scholar
  11. 11.
    Ngan, T.W.J., Wallach, D.S., Druschel, P.: Enforcing fair sharing of peer-to-peer resources. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  12. 12.
    Komarov, A.: (Geek Credit homepage) Hypertext document, Available electronically at: http://home.gna.org/geekcredit/
  13. 13.
    Yang, B., Garcia-Molina, H.: PPay: micropayments for peer-to-peer systems. In: Proceedings of the 10th ACM conference on Computer and communications security (CCS 2003) (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Kenji Saito
    • 1
  • Eiichi Morino
    • 2
  • Jun Murai
    • 3
  1. 1.Graduate School of Media and GovernanceKeio UniversityKanagawaJapan
  2. 2.Gesell Research SocietyJapan
  3. 3.Faculty of Environmental InformationKeio University 

Personalised recommendations