期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A New Protocol for Multi-Item Electronic Auctions
1
作者 HUANG Genxun ZHOU Ran WEI Fushan YU Gang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1891-1894,共4页
The authors propose a new protocol for muhizzitem electronic auctions. It has the following advantages: first, the protocol is more applicable and flexible than the previous protocols, in this protocol, each bidder c... The authors propose a new protocol for muhizzitem electronic auctions. It has the following advantages: first, the protocol is more applicable and flexible than the previous protocols, in this protocol, each bidder can decide how many items to buy according to diiferent bidding prices, which are set by the seller at the beginning of the auction; second, privacy is well preserved, no third parties are needed in the protocol and the auction outcome is jointly computed by the bidders on their own without uncovering any additional information. 展开更多
关键词 electronic auction HOMOMORPHISM zero-knowledge proof
下载PDF
New Sealed-Bid Electronic Auction with Fairness,Security and Efficiency 被引量:1
2
作者 吴家麒 张真诚 林詠章 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第2期253-264,共12页
Electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malici... Electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. Recently, Liaw et al. proposed an auction protocol for electronic online bidding in which they designed a deposit deduction certification for government procurement. However, it also has above mentioned flaw. Moreover, we further found that there were some extra security drawbacks in their protocol. First, the bidder can forge a bidding receipt to claim that he/she is a valid auction winner. Second, it may suffer from the third party forging attack. Third, their protocol leaked some bidders' private information to the third party, such as the bidder's bank account number and the authorization code. Thus, it cannot protect the bidder's privacy at all. In this paper, we not only point out the drawbacks from the previous scheme but also propose a new electronic auction scheme to overcome the above mentioned drawbacks. Furthermore, the computational complexity can be decreased in our online sealed-bid auction scheme. 展开更多
关键词 electronic auction E-COMMERCE information security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部