期刊文献+

电子拍卖的研究现状与进展 被引量:6

A survey of research on electronic auction
下载PDF
导出
摘要 阐述了电子拍卖的基本性质,分析了目前电子拍卖研究的主要动态及当前的研究现状,讨论了拍卖标价的秘密性、投标者的匿名控制和第二价位拍卖等问题,得出一些研究结果。最后给出进一步研究的方向和现有的公开问题。 Electronic auction is one of the most important procedures of electronic commence, and a survey of research on electronic auction is proposed in this paper. Firstly we described the basic properties of the auction, secondly we expatiated the main developments and present study situation among the problems of bid secrecy, bidder privacy and the second-price auction,also we present our contribution to these problems. Finally we specialized some directions of further work and some open problems.
出处 《通信学报》 EI CSCD 北大核心 2002年第12期73-81,共9页 Journal on Communications
基金 国家自然科学基金资助项目(19931010)
关键词 秘密标价 第二价位 电子拍卖 电子现金 电子商务 bid secrecy the second-price electronic auction electronic cash
  • 相关文献

参考文献24

  • 1SANDHOLM T, NOMAD H Q. Mobile agent system for an internet-based auction house[J]. IEEE Internet Computing, 2000, 80-86, http://computer.org/internet.
  • 2HARKAVY M,KIKUCH H, TYGAR J D. Electronic auction with private bids[A]. Proc of the 3rd USENIX Workshop on Electronic Commence[C]. August 1998.
  • 3MILGROM P. Auction theory[A].In Advances in Economic Theory 1985:Fifth World Congress[C]. Cambridge University Press,1985.
  • 4VICKREY W. Counterspeculation,auctions,and competitive sealed tenders[J]. Journal of Finance,1961,16(1): 8-37.
  • 5KIKUCH H, HARKAVY M, TYGAR J D. Multi-round anonymous auction protocols[A]. Proc of the 1st IEEE Workshop on Dependable and Real-time E-Commence systems[C]. 1998. 62-69.
  • 6NAOR M, PINKAS B, SUNNER R. Privacy preserving auction and mechanism design[A]. Proc of 1st ACM Conference on Electronic Commerce[C]. 1999. http://www.wisdom.weizmann.ac.il/~naor/index.html.
  • 7BONCH D, NAOR M. Timed commitments[A]. CRYPTO'00[C]. LNCS 1880.Springer-Verlag, 2000. 236-254.
  • 8SHAIR A. How to share a secret[J]. Comm ACM, 1979, 22(11): 612-613.
  • 9CHAUM D, VAN HEGST E. Group signatures[A]. Eurocrypt'91[C]. LNCS 547, Springer-Verlag, 1991. 257-265.
  • 10CAMENISCH J, STADLER M. Efficient group signature schemes for large groups[A]. CRYPTO'97[C]. LNCS 1294, Springer-Verlag, 1997.410-424.

二级参考文献6

  • 1[1]M. Gaynor, J. Megquier, V. Sethaput, Secure Vickrey Auction Prol ocol.http: //sonnet.eas.harvard.edu/auction/paper.html.
  • 2[2]M. Harkavy, H. Kikuch, J. D. Tygar, Electronic auction with private bids, Proc. of the 3rd CSEIX Workshop on Electronic Commerce, August 1998.
  • 3[3]W. Vickrey, Counter speculation, auctions, competitive sealed tenders, ,Journal of Finance. 1961,16,8-37.
  • 4[4]B. Schneier, Applied Cryptography, John Wiley & Sons, Inc, 1996.
  • 5[5]P.X. lilgrom, Auction theory, In Advances in Economic Theory 1985, Fifth World Congress, London. Cambridge University Press, 1985.
  • 6[6]M. K. Franklin, M. K. Reiter, The design and implementation of a secure auction server, IEEE Trans. on Soft.ware Engineering, 1996, SE-22(5), 302-312.

共引文献4

同被引文献50

  • 1马春波,敖珺,何大可.基于双线性映射的多重签名与群签名[J].计算机学报,2005,28(9):1558-1563. 被引量:14
  • 2黄秀姐,林群,王燕鸣.基于短群签名的安全电子拍卖方案[J].中山大学学报(自然科学版),2006,45(6):21-25. 被引量:5
  • 3CHAUM D, VAN HEYST E. Group signatures[C]//EUROCRYPT 1991. Lecture Notes in Computer Science. Berlin: SPringer-Verlag, 1991 : 257-265.
  • 4LIU X,XU Q L,SHANG J Q. A public auction scheme based on group signature[C]//Proceedings of the 3rd International Conference on Information Security. New York: ACM, 2004: 136- 142.
  • 5NGUYEN K Q,TRAORE J. An online public auction protocol protecting bidder privacy[C]//ACISP 2000. Lecture Notes in Computer Science 1841. Berlin:Springer-Verlag,2000:427-442.
  • 6OMOTE K, MIYAJI A. A practical english auction with one- time registration[C]//ACISP 2001:Lecture Notes in Computer Science 2119. Berlin: Springer-Verlag, 2001 : 221-234.
  • 7SAKURAI K, MIYAZAKI S. An anonymous electronic bidding protocol based on a new convertible group signature scheme [C]//ACISP 2000: Lecture Notes in Computer Science 1841. Berlin: Springer-Verlag,2000 : 385-399.
  • 8CAMENISH J, STADLER M. Efficient group signature scheme for large groups[C]//CRYPTO 1997: Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997 : 410-424.
  • 9ATENIESE G, CAMENISH J, JOYE M, ET AL. A practical and provably secure coalition-resistent group signature scheme [C]//CRYPTO 2000: Lecture Notes in Computer Science 1880. Berlin : Springer-Verlag, 2000 : 255-270.
  • 10BONEH D, BOYEN X, SHACHAM H. Short group signatures [C]//CRYPTO 2004: Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2004 : 41-55.

引证文献6

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部