期刊文献+

New Sealed-Bid Electronic Auction with Fairness,Security and Efficiency 被引量:2

New Sealed-Bid Electronic Auction with Fairness,Security and Efficiency
原文传递
导出
摘要 Electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. Recently, Liaw et al. proposed an auction protocol for electronic online bidding in which they designed a deposit deduction certification for government procurement. However, it also has above mentioned flaw. Moreover, we further found that there were some extra security drawbacks in their protocol. First, the bidder can forge a bidding receipt to claim that he/she is a valid auction winner. Second, it may suffer from the third party forging attack. Third, their protocol leaked some bidders' private information to the third party, such as the bidder's bank account number and the authorization code. Thus, it cannot protect the bidder's privacy at all. In this paper, we not only point out the drawbacks from the previous scheme but also propose a new electronic auction scheme to overcome the above mentioned drawbacks. Furthermore, the computational complexity can be decreased in our online sealed-bid auction scheme. Electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. Recently, Liaw et al. proposed an auction protocol for electronic online bidding in which they designed a deposit deduction certification for government procurement. However, it also has above mentioned flaw. Moreover, we further found that there were some extra security drawbacks in their protocol. First, the bidder can forge a bidding receipt to claim that he/she is a valid auction winner. Second, it may suffer from the third party forging attack. Third, their protocol leaked some bidders' private information to the third party, such as the bidder's bank account number and the authorization code. Thus, it cannot protect the bidder's privacy at all. In this paper, we not only point out the drawbacks from the previous scheme but also propose a new electronic auction scheme to overcome the above mentioned drawbacks. Furthermore, the computational complexity can be decreased in our online sealed-bid auction scheme.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第2期253-264,共12页 计算机科学技术学报(英文版)
关键词 electronic auction E-COMMERCE information security electronic auction, e-commerce, information security
  • 相关文献

参考文献22

  • 1Franklin M K, Reiter M K. The design and implementation of a secure auction service. IEEE Transactions on Software Engineering, May 1996, 22(5): 302-312.
  • 2Kudo M. Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Transactions on Fundamentals, Jan. 1998, E81-A(1): 20-27.
  • 3Kikuchi H, Hakavy M, Tygar D. Multi-round anonymous auction protocols. IEICE Transactions on Information and Systems, Apr. 1999, E82-D(4): 769-777.
  • 4Chang C C, Chang Y F. Efficient anonymous auction protocols with freewheeling bids. Computers & Security, 2003, 22(8): 728-734.
  • 5Jiang R, Pan L, Li J H. An improvement on efficient anonymous auction protocols. Computers & Security, 2005, 24(2): 169-174.
  • 6Chang C C, Chang Y F. Enhance anonymous auction protocols with freewheeling bids. In Proc. the 20th International Conference on Advanced Information Networking and Applications (AINA PO06), Vienna, Austria, Vol. 1, Apr. 2006, pp.353-358.
  • 7Liaw H T, Juang W S, Lin C K. An electronic online bidding auction protocol with both security and efficiency. Applied Mathematics and Computation, 2006, 174(2): 1487-1497.
  • 8Subramanian S. Design and verification of a secure electronic auction protocol. In Proc. IEEE 17th Symposium on Reliable Distributed Systems, Washington DC, USA, 1998, pp.204- 210.
  • 9Chen T S. An English auction scheme in the online transaction environment. Computers & Security, 2004, 23(5): 389- 399.
  • 10Rivest R. The MD5 message-digest algorithm. RFC 1321, Internet Activities Board, Internet Privacy Task Force, 1992.

同被引文献12

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部