期刊文献+

基于秘密分享的一种新的电子拍卖 被引量:4

A new electronic auction based on secret sharing
下载PDF
导出
摘要 为了实现标价的匿名性,提出了一种基于秘密分享机制的新的电子拍卖协议,根据LaGrange门限秘密分享体制把标价分为n份,分几次提交给拍卖中心,直到找到最高价为止,此方案比基于Shamir秘密分享方案的多方计算协议使多个拍卖代理分享投标人身份的电子拍卖,在计算效率和通信效率上有显著提高.并将此方案推广到任何的秘密分享电子拍卖方案的设计中. Security and privacy are the crucial conditions in the sealauciton design. For an anonymous bid, a new electronic auction is presented based on secret sharing system in this paper, with the bids divided into n parts by the LaGrange threshold secret sharing system, and submitted to the auctioneer center by several times until seeking the highest bid. The scheme differs from the previous electronic auction of secret sharing of the multicomputation protocol that multiproxies of auction share the identities of bidders. Its efficiency is distinctly improved in computation and communication. Subsequently, this scheme is generalized to any electronic auction based on secret sharing.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2003年第5期659-662,共4页 Journal of Xidian University
基金 国家自然科学基金资助项目(19931010)
关键词 秘密分享 电子拍卖 HASH函数 LaGrange门限 secret sharing HASH function electronic auction general secret sharing auction
  • 相关文献

参考文献9

  • 1毛剑,陈晓峰,王育民.一个具有隐私保护的数字产品匿名交易方案[J].西安电子科技大学学报,2002,29(5):632-634. 被引量:3
  • 2Frankin M, Reiter M. The Design and Implementation of a Secure Auction Service[J]. IEEE Trans on Software Engineering, 1996, 22(5) : 302-312.
  • 3Kikuchi H, Harkavy M, Tyger D. Multi-round Anonymous Auction Protocols [ A ]. proceeding of the First IEEE Workshop on Dependable and Real-time E-eommerce Systems[ C]. Berlin: Springer Verlag, 1998.62-69.
  • 4Kudo M. Secure Electronic Sealed-bid Auction Protocol with Public Key Cryptography[J]. IEICE Trans on Fundamentals, 1998, E81-A(1): 20-27.
  • 5Franklin M K, Reiter M K. The Design and Implementation of Secure Auction Service[J]. IEEE Trans on Soitware Engineering, 1996,22(5) : 302-312.
  • 6Mu Y, Varadherajan V. An Internet Anonymous Auction Scheme[ A]. Lecture Notes in Computer Science[C]. Berlin: Springer-Verlag,2001. 171-182.
  • 7EIGamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J]. IEEE Trans on Information Theory,1985, 31(4): 269-272.
  • 8Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 24(1): 612-613.
  • 9Blakley G R. Safeguarding Cryptographic Keys[A]. Proceedings of the National computer Conference[C]. Berlin: Springer-Verlag,1979. 313-317.

二级参考文献1

共引文献2

同被引文献37

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部