期刊文献+

一种推广的Power安全拍卖方案

Generalized secure power auction scheme
下载PDF
导出
摘要 为了更好地保护投标者,提出了一种推广的 Power安全拍卖方案.投标时利用带消息复原机制的签名算法递交投标者的身份、份额,保证开标时中标人的不可否认性.采用匿名机制,对除中标者外的其他所有投标者的投标价进行保密,保证在整个拍卖过程中,无人可以操纵其他人的投标.基于 Asmuth Bloom秘密共享方案,推广方案可以求出中标的任意价位,从而满足商品的最优化分配.与同类方案相比,该推广方案所需的额外计算轮数与投标人数无关,具有较好的安全性、公平性和推广性能. An extended power auction scheme was proposed for protecting bidders. In this scheme, a digital signature algorithm with message recovery was used to submit the bidders' identity and bidding shares, which prevented the winner from denying his bid. An anonymity mechanism was employed to keep all bidders' bidding values secret except for the winner. Thus nobody can manipulate other bidders in the whole auction. Based on Asmuth-Bloom secret sharing scheme, this auction scheme can solve any bidding price, which supports the optimal distribution of goods. Compared with the similar schemes, the additional computing of this scheme is independent of the number of bidders, and this scheme has high security, good fairness and high generalization performance.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2005年第2期221-224,共4页 Journal of Zhejiang University:Engineering Science
基金 浙江省自然科学基金资助项目(001101352).
关键词 完全匿名 Power拍卖 秘密共享 投标 推广 Cryptography Data privacy Electronic document identification systems Financial data processing Security of data
  • 相关文献

参考文献14

  • 1MCAFEE R, MCMILLAN J. Auction and bidding [J]. Journal of Economic Literature, 1987, 25(6): 699-738.
  • 2HARKAVY M, KIKUCH H, TYGRA J D. Electronic auction with private bids [A]. Proceedings of the 3rd USENIX Workshop on Electronic Commerce [C]. Massachusetts: [s.n.], 1998: 61-74.
  • 3GAYNOR M, MEGQUIER J, SETHAPUT V. Secure Vickrey auction protocol [EB/OL]. http: //sonnet.eas.harvard.edu/auction/paper.html, 2000-08-15.
  • 4VICKREY W. Counterspeculation, auctions and competitive sealed tenders [J]. Journal of Finance, 1961, 16(1): 8-37.
  • 5KIKUCHI H. Power auction protocol without revealing winning bids [A]. Proceedings of the 15th International Conference on Information Networking [C].[s.t.]: IEEE, 2001: 61-64.
  • 6EIJI T, YOSHIAKI T. Bandwidth allocation by using generalized Vickrey auction [EB/OL]. http: //www.tanaka.giti.waseda.ac.jp/Document/Pricing/APSITT2001_et.pdf, 2001-03-08.
  • 7IMAMURA Y, MATSUMOTO T, IMAI H. Electronic anonymous bidding scheme [A]. The 1994 Symposium on Cryptography and Information Security [C].Australia: IEEE, 1994: 152-156.
  • 8NAKANISHI T, WATANABC H, FUJIWARA T, et al. An anonymous bidding protocol using undeniable signature [A]. The 1995 Symposium on Cryptography and Information Security [C].Singapore: IEEE, 1995: 106-112.
  • 9KUDO M. Secure electronic sealed-bid auction protocol with public key cryptography [A]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science [C].Massachusetts: Oxford University Press, 1998: 20-27.
  • 10KIKUCHI H, NAKANISHI S. Registration-free protocol for anonymous auction [A]. Proceedings of Computer Security Symposium'98 [C]. London: IEEE, 1998: 243-248.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部