期刊文献+

基于比特承诺的电子拍卖方案

An Electronic Auction Scheme Using Bit-Commitment
下载PDF
导出
摘要 在拍卖过程中如何保护投标者隐私和防止中标者反悔是设计安全电子拍卖系统的关键问题,也是目前网上拍卖系统急需解决的问题。文章利用伪随机数产生理论和比特承诺机制的优点,给出了一个实现随机标价的密封式电子拍卖方案。该方案除了满足投标者匿名、投标价保密、不可否认性、强可验证性等安全要求外,还具有技术简单、通信量小、随机标价、限时强迫兑现等优点。 The protection of bidder privacy and the prevention of bidder default are the keys in the designing of secure Electronic Auction scheme.These problems must be resolved urgently.This paper gives a secure randomly sealed- bids auction scheme using Pseudo-Randomness generator and Bit commitment.This scheme can satisfy all the secure requirement of sealed-bid auction stated such as bidder anonymity,bld secrecy,bidder default,verification,and has the advantages of simple technique,small cost of communication,randomly bid,forced-reveal,etc.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第24期201-202,217,共3页 Computer Engineering and Applications
基金 国家自然科学基金重大项目(编号:90104028)资助
关键词 比特承诺 伪随机数 电子拍卖 随机标价 强迫兑现 bit commitment, pseudo-randomness, electronic auction, randomly sealed-bids, forced-reveal
  • 相关文献

参考文献8

  • 1Perrig A,Smith S et a1.SAM:A Flexible and Secure Auction Architecture Using Trusted Hardware[J].The Electronic Journal for E-Commerce Tools and Applications ,2002; 1 ( 1 ).
  • 2Omote K.A Study on Electronic Auctions[J].IEEE Trans on Software Engineering, 1996;22(5) :302-312.
  • 3Chida K,Kobayashi K,Morita H.Efficient Sealed-bid Auction Using Hash Chain[C].In : Proceedings of ICISC2000,2000 : 189-197.
  • 4Sako K.An Auction Protocol Which Hides Bids of Losers[C].In:Proceedings of PKC2000,2000:422-432.
  • 5Naor M.Bit commitment Using Pseudo-Randomness[C].In .. Proceedings on Advances in cryptology, 1989 : 128-136.
  • 6Hogan D.Commitment Scheme.Http://www.sciencedaily.com/encyclopedia/commitment scheme, 2004.
  • 7Langberg M.An Implementation of Efficient Pseudo-Random Functions. http ://www.wisdom.weizmann.ac.il/-naor/p_r_func/pr/pr.html, 1998-03.
  • 8陈晓峰,王育民.电子拍卖的研究现状与进展[J].通信学报,2002,23(12):73-81. 被引量:6

二级参考文献24

  • 1GAYNOR M,MEGQUIER J, SETHAPUT V. Secure vickrey auction protocol [EB/OL].http://sonnet.eas.harvard. edu/auction/ paper.html
  • 2CHEN X F, MAO J, WANG Y M. Secure vickrey auction protocol[A]. 2nd China Information and Communication Secure Conference [C]. 2000.209-214.
  • 3PARKES D C, UNGAR L H. Iterative combinatorial auctions: theory and practice[A]. Proc of 17th National Conference on Artificial Intelligence(AAA-00)[C]. 2001. 74-81.
  • 4KIKUCHI H. (M+1)st-price auction[A]. FC'01[C]. IFCA, 2001. 291-298.
  • 5SAKO K. An auction protocol which hides bids of losers[A]. PKC 2000[C]. LNCS 1751, 2000.422-433.
  • 6CHEN X F, GAO H M, WANG Y M. An anonymous auction protocol with randomly sealed bids[J]. Chinese Journal of Electronics, 2002,11(4):499-501.
  • 7NGUYEN K Q, TRAORE J. An online public auction protocol protecting bidder privacy[A]. ACISP 2000[C]. LNCS 1841, 2000. 427-442.
  • 8VISANATHAN K, BYOD C, DAWSON E. A three phased schema for sealed bid auction system design[A]. ACISP 2000[C]. LNCS 1841, 2000. 412-426.
  • 9SANDHOLM T, NOMAD H Q. Mobile agent system for an internet-based auction house[J]. IEEE Internet Computing, 2000, 80-86, http://computer.org/internet.
  • 10HARKAVY M,KIKUCH H, TYGAR J D. Electronic auction with private bids[A]. Proc of the 3rd USENIX Workshop on Electronic Commence[C]. August 1998.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部