期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A New Protocol for Multi-Item Electronic Auctions
1
作者 HUANG Genxun ZHOU Ran WEI Fushan YU Gang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1891-1894,共4页
The authors propose a new protocol for muhizzitem electronic auctions. It has the following advantages: first, the protocol is more applicable and flexible than the previous protocols, in this protocol, each bidder c... The authors propose a new protocol for muhizzitem electronic auctions. It has the following advantages: first, the protocol is more applicable and flexible than the previous protocols, in this protocol, each bidder can decide how many items to buy according to diiferent bidding prices, which are set by the seller at the beginning of the auction; second, privacy is well preserved, no third parties are needed in the protocol and the auction outcome is jointly computed by the bidders on their own without uncovering any additional information. 展开更多
关键词 electronic auction HOMOMORPHISM zero-knowledge proof
下载PDF
New Sealed-Bid Electronic Auction with Fairness,Security and Efficiency 被引量:2
2
作者 吴家麒 张真诚 林詠章 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第2期253-264,共12页
Electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malici... Electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. Recently, Liaw et al. proposed an auction protocol for electronic online bidding in which they designed a deposit deduction certification for government procurement. However, it also has above mentioned flaw. Moreover, we further found that there were some extra security drawbacks in their protocol. First, the bidder can forge a bidding receipt to claim that he/she is a valid auction winner. Second, it may suffer from the third party forging attack. Third, their protocol leaked some bidders' private information to the third party, such as the bidder's bank account number and the authorization code. Thus, it cannot protect the bidder's privacy at all. In this paper, we not only point out the drawbacks from the previous scheme but also propose a new electronic auction scheme to overcome the above mentioned drawbacks. Furthermore, the computational complexity can be decreased in our online sealed-bid auction scheme. 展开更多
关键词 electronic auction E-COMMERCE information security
原文传递
Secure blockchain bidding auction protocol against malicious adversaries
3
作者 Xiaobing Dai Jiajing Liu +2 位作者 Xin Liu Xiaofen Tu Ruexue Wang 《High-Confidence Computing》 EI 2024年第3期58-63,共6页
In recent years,with the development of blockchain,electronic bidding auction has received more and more attention.Aiming at the possible problems of privacy leakage in the current electronic bidding and auction,this ... In recent years,with the development of blockchain,electronic bidding auction has received more and more attention.Aiming at the possible problems of privacy leakage in the current electronic bidding and auction,this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries,which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party.The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography.It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants,which can solve the problem of resisting malicious adversary attacks.The security of the protocol is proved by the real/ideal model paradigm,and the efficiency of the protocol is analyzed.The efficiency of the protocol is verified by simulating experiments,and the protocol has practical value. 展开更多
关键词 Blockchain Secure multi-party computation electronic bidding auction Malicious model Real/ideal model paradigm
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部