期刊文献+

一个基于环签名的英式电子拍卖协议 被引量:2

English Auction Protocol Based on Ring Signatures
下载PDF
导出
摘要 提出了一个基于双线性对的环签名方案,该方案具有如下特点:(1)签名者的身份可通过管理员追踪;(2)管理员的身份追踪权能被分享;(3)当签名中用于追踪签名人部分的内容为空时,它依然是一个具有无条件匿名性的环签名方案;(4)保留了环签名较群签名灵活和有效的优点。最后利用该方案对Omote和Miyaji的英式电子拍卖协议进行改进,克服了原协议中参加同一次拍卖的投标者的多次投标能被跟踪的缺点。 In this paper,we propose a ring signature scheme based on bilinear maps.It has the following advantages: (1)The manager can identify the signer from her/his signature.(2)The traceability of the manager can be shared with others.(3)When the strings using to find the signer in the signature is null,the scheme is an ordinary ring signature scheme with unconditional anonymity. (4)The scheme keeps the properties such as no setup procedures and no coordination comparing with the group signature scheme.Then we improve the Omote and Miyaji's English auction protocol by utilizing our ring signature scheme.The new English auction protocol has not the drawback:in an auction anybody can link which bids are placed by the same bidder.
作者 吴克力
出处 《计算机工程与应用》 CSCD 北大核心 2006年第31期219-222,共4页 Computer Engineering and Applications
基金 国家部委应用基础基金 江苏省高校自然科学研究指导性项目(03KJD520055)
关键词 环签名 群签名 英式拍卖 双线性对 ring signature scheme group signature scheme Engllsh auction bilinear maps
  • 相关文献

参考文献8

  • 1陈晓峰,王育民.电子拍卖的研究现状与进展[J].通信学报,2002,23(12):73-81. 被引量:6
  • 2王继林,余斌霄,王育民.一类基于Bit承诺的安全电子拍卖模型[J].计算机学报,2004,27(3):347-351. 被引量:7
  • 3NGUYEN K Q,TRAORE J.An online public auction protocol protecting bidder privacy[C]//Information Security and Privacy,ACISP 2000.[S.l.]:Springer-Verlag,2000:427-442.
  • 4OMOTE K,MIYAJI A.A practical English auction with simple revocation[J].IEICE Trans Fundamentals,2002,E85-A (5):1-8.
  • 5RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//Cryptology-Asiacrypt 2001,LNCS 2248.Berlin:Springer-Verlag,2001:552-565.
  • 6ZHANG F,KIM K.ID-based blind signature and ring signature frim pairings[C]//Cryptology-Asiacrypt 2002,LNCS 2501.Berlin:Springer-Verlag,2002:533-547.
  • 7王继林,张键红,王育民.基于环签名思想的一种类群签名方案[J].电子学报,2004,32(3):408-410. 被引量:13
  • 8BONEH D,FRANKLIN M.Identity-based encryption from the weil pairing[C]//Proceedings of Crypto 2001,LNCS 2139.Berlin:SpringerVerlag,2001:213-229.

二级参考文献36

  • 1[1]Franklin M.K., Reiter M.K.. The design and implementation of a secure auction service. IEEE Transactions on Software Engineering, 1996, 22(5): 302~312
  • 2[2]Mu Yi, Varadharajan V.. An internet anonymous auction scheme. In: Proceedings of the 3rd International Conference on ICISC 2000, Seoul, Korea, 2000, 171~182
  • 3[3]Sakurai K., Miyazaki S.. An anonymous electronic bidding protocol based on a new convertible group signature scheme. In: Proceedings of ACISP2000, Brisbane, Australia, 2000, 385~399
  • 4[4]Sakurai K.. A bulletin -board based digital auction scheme with bidding down strategy. In: Proceedings of CryptTEC'99, Hong Kong, 1999, 180~187
  • 5[5]Suzuki K. et al.. Efficient sealed-bid auction using Hash chain. In: Proceedings of the 3rd International Conference on ICISC 2000, Seoul, Korea, 2000, 183~191
  • 6[6]Kikuchi H.. M+1st-price auction. In: Proceedings of the 5th International Conference on Financial Cryptography'01, Cayman Islands, BWI, 2001, 291~298
  • 7[7]Abe M., Suzuki K.. M+1-st price auction using homomorphic encryption. In: Proceedings of the Cryptosystems (PKC 2002), Paris, France, 2002, 115~124
  • 8[1]D Chaum,E van Heyst.Group signatures[A].LNCS 547,Proc of Eurocrypt'91[C].Berlin:Springer-Verlag,1992.257-265.
  • 9[2]R L Rivest,A Shamir,Y Tauman.How to leak a secret[A].LNCS 2248,Proc of Asiacrypt01[C].Berlin:Springer-Verlag,2001.552-565.
  • 10[3]Emmanuel Bresson,Jacques Stern,Michael Szydlo.Threshold ring signatures for ad-hoc groups[A].LNCS 2442,Cryptology-2002[C].Berlin:Springer-Verlag,2002.465-480.

共引文献23

同被引文献13

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部