期刊文献+

基于中国剩余定理秘密共享的电子拍卖协议

A New Electronic Auction Based on Secret Sharing of Chinese Remainder Theory
下载PDF
导出
摘要 文章根据中国剩余定理秘密共享体制,提出了一个安全、高效、密封的电子拍卖协议。在该协议中利用电子现金作为标书的组成部分,保证了最后的买家一定能付款;并且与传统的基于Shamir秘密门限共享体制相比,在执行效率上有显著提高。 A security,efficacious and secret electronic auction is presented based on secret sharing of chinese remainder theory in this paper.In order to ensure the winner can pay money in the end,the electronic auction uses electronic cash as a part of the bid;and compares with the previous electronic auction based on Shamir secret sharing, its efficiency is distinctly improved in computation and communication.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第32期217-219,232,共4页 Computer Engineering and Applications
关键词 中国剩余定理 密封式电子拍卖 电子现金 chinese remainder theory,secret electronic auction,electronic cash
  • 相关文献

参考文献16

  • 1Kikuch H,Harkavy M ,Tygar J D.Multi-round Anonymous Auction Protocols[C].In:Proceedings of the First IEEE workshop on Dependable and Real-time E-commerce Systems,New York:IEEE,1998:62-69.
  • 2Sako k.An Auction Protocol Which Hides Bids of Losers[C].In:Proceedings of PKC2000,Berlin Heidelberg:Springer_Verlag,2000:422-432.
  • 3Cachin C.Efficient Private Bidding and Auctions with an Oblivious Third Party[C].In:6^th ACM Conference on Computer and Communications Security(CCS) ,New York:ACM, 1999 : 120-127.
  • 4Chids K,Kobayashi K,Mortita H.Efficient Dealed-bid Auctions for Massive Numbers of Bidders with Lump Comparison[C].In:ISC 2001, LNCS 2200,Berlin Heidelbreg:Springer-Veralg,2001:408-419.
  • 5王继林,高虎明,王育民.一个安全的M+1价位电子拍卖方案[J].西安电子科技大学学报,2003,30(5):669-672. 被引量:3
  • 6梁坚,敖青云,尤晋元.最小容错限制和最大保密特性的分布电子拍卖协议[J].计算机工程与应用,2002,38(5):62-65. 被引量:1
  • 7M Harkavy,J D Tygar,H Kikuchi.Electronic auctions with private bids[C].In:3^rd USENIX Workshop on Electronic Commerce,Boston,Mass, 1998.
  • 8D X Song,J K Millen.Secure auction in a publish/subscribe system[R]. SRI International In:Technical Reports,http://www2.csl.sri.com/- millen/deca8.ps.
  • 9M K Fanklin,M kK Reiter.The design and implementation of a secure auction service[J].IEEE Transactions on Software Engineeing, 1996;22(5).
  • 10Shamir A.How to Share a Secret[J].Communications of the ACM, 1979 ;24( 1 ) :612-613.

二级参考文献21

  • 1[1]R McAfee,J McMillan.Auction and bidding[J].Journal of Economic Literature, 1987; 25 (6)
  • 2[2]C Beam,A Segev,J G Shanthikumar. Electronic negotiation throughIntemet-based auctions[C].In:CITM working paper 96-WP-1016,Haas School,Berkeley, 1996
  • 3[3]M K Fanklin,M K Reiter. The design and implementation of a secure auction service[J].lEEE Transactions on Software Engineering, 1996;22(5)
  • 4[4]D X Song,J K Millen.Secure auction in a publish/subscribe system [R].SR1 International In :Technical Reports, http://www2.csl.sri.com/millen/dccaS.ps
  • 5[5]M Harkavy,J D Tygar,H Kikuchi. Electronic auctions with private bids[C].In: 3rd USENIX Workshop on Electronic Commerce, Boston, Mass, 1998
  • 6[6]S Subramanian. Design and verification of a secure electronic auction protocol[R].The Ohio State University,Department of Computer andInformation Science,Technical repons OSU-CISRC-5/98-TR15,file: / /ftp.cis.ohio-state.edu/pub/tech-report/1998 /TR12.ps.gz
  • 7[7]J D Tygar. Atomicity in electronic commercce[C].In:Proceedings of the 2nd USENIX Workshop on electronic commerce, 1996
  • 8[8]A Shamir. How to share a secret[J].Communications of the ACM,1979;22(11 )
  • 9[9]0 Goldreich. Secure multi-party computation(working draft).Availablefrom http://www.wisdom.weizmann.ac.il/?oded/foc.html, 1998
  • 10[10]L Lamport,R Shostak ,M Pease.The Byzantine generals problems[J].ACM Transactions on Progrannning Languages and System, 1982;4( 3 )

共引文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部