This paper proposed a new kind of P2P micro- [6] T. Pedersen. Electronic payments of small amounts. Mark
payment protocol, CPay. CPay uses transferable coins, Lomas. Proceedings of 1996 International Workshop on
and sheds the checking work onto the peers which have Security Protocols. Berlin, Germany ദ Springer Verlag,
more bandwidth, more on-line time, higher Lecture Notes in Computer Science No. 1189, 1997, pp.59 -
computational power, and more credibility. Thus, 68.
CPay reduces the workload of the broker from
controlling all transactions in the system to controlling [7] S. Micali and R. L. Rivest. Micropayments revisited.
only BA peers. Besides, the consistent hashing that the Lecture Notes in Computer Science 2002, v 2271, pp.149ˀ
263.
CPay protocol exploits can achieve load-balance
among the BA peers, which will effectively improve [8] B.Yang and H.Garcia-Molina. PPay: micropayments for
the system performance. CPay is also a secure payment peer-to-peer systems. Proceedings of the 10th ACM
protocol, in which all coin forgery, coin thievery, Conference on Computer and Communication Security, New
double-spending and masquerading will be detected. York, USA: ACM Press, 2003, pp.300--310.
The paper also proposed two variations to offer more
trade-off shemes for implementation. [9] V. Vishnumurthy, S. Chandrakumar, E.G.Sirer. KARMA:
However, our work doesn’t cover the following two a secure economic framework for peer-to-peer resource
aspects: sharing. Proceedings of the Workshop on the Economics of
P2P Systems, Berkeley, USA, 2003. Paper published on
1. How will the process of consistent hashing affect
website:
the system performance? What is the relationship http://www.sims.berkeley.edu/research/conferences/p2pecon/
between the bandwidth it will consume and the program.html
dynamics of the system, such as the number of the
peers, the number of the BAs, and the frequency of the [10] F. D. Garcia and J.-H. Hoepman. Off-line Karma: A
transactions and so on? Decentralized Currency for Static Peer-to-peer and Grid
2. How should we apply CPay to the current P2P Networks. Coming in 5th International Network Conference
applications to offer a complete incentive mechanism (INC2005), July 5-7 2005.
for those systems?
[11] D.Karger, E.Lehman, T.Leighton, et al. Consistent
Both of the two aspects are very important and will
Hashing and Random Trees: Distributed Caching Protocols
be the directions of our future research work. for Relieving Hot Spots on the World Wide Web[A].
Proceedings of the 29th Annual ACM Symposium on Theory
7. References of Computing[C]. New York, USA: ACM Press, 1997,
pp.654-663.
[1] Zihui Ge, Daniel R. Figueiredo, et.al. Modeling Peer-Peer
File Sharing Systems. Proceedings of INFOCOM 2003, [12] I.Stoica, R.Morris, D.Karger, et al. Chord A Scalable
Santa Fe, NM: IEEE, 2003, pp.2188-2198. Peer-to-peer Lookup Service for Internet Applications[A].
Proceedings of ACM SIGCOMM[C], New York, USA:
[2] S.Glassman, M.Manasse, et.al. The Millicent Protocol for ACM Press, 2001, pp.149-160.
Inexpensive Electronic Commerce
http://www.research.digital.com/SRC/millicent/papers/millic
ent-w3c4/millicent.html, 1995.