Skip to main content
Erschienen in: Information Systems Frontiers 3/2009

01.07.2009

A secure e-auction scheme based on group signatures

verfasst von: Cheng-Chi Lee, Pi-Fang Ho, Min-Shiang Hwang

Erschienen in: Information Systems Frontiers | Ausgabe 3/2009

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, electronic auctions have been receiving more and more attention in the world of electronic commerce. The security and efficiency of electronic auctions are becoming important. We shall propose a securely sealed-bid auction scheme that uses our group signature scheme with the function of authenticated encryption. It can achieve the following goals: secrecy of bidding price, anonymity, verifiability, non-repudiation, and better performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Chang, C. C., & Chang, Y. F. (2003). Efficient anonymous auction protocols with freewheeling bids. Computers & Security, 22(8), 728–734.CrossRef Chang, C. C., & Chang, Y. F. (2003). Efficient anonymous auction protocols with freewheeling bids. Computers & Security, 22(8), 728–734.CrossRef
Zurück zum Zitat Chaum, D. (1982). Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, & A. T. Sherman (Eds.), Advances in cryptology, CRYPTO’82 (pp. 199–203). New York: Plemum. Chaum, D. (1982). Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, & A. T. Sherman (Eds.), Advances in cryptology, CRYPTO’82 (pp. 199–203). New York: Plemum.
Zurück zum Zitat Chaum, D., & Heyst, E. (1991). Group signatures. In Advances in cryptology, Eurocrypt’91 (pp. 257–265). Lecture Notes in Computer Science. Chaum, D., & Heyst, E. (1991). Group signatures. In Advances in cryptology, Eurocrypt’91 (pp. 257–265). Lecture Notes in Computer Science.
Zurück zum Zitat Fan, L., Xu, C. X., & Li, J. H. (2002). Deniable authentication protocol based on Diffie-Hellman algorithm. Electronics Letters, 38(14), 705–706.CrossRef Fan, L., Xu, C. X., & Li, J. H. (2002). Deniable authentication protocol based on Diffie-Hellman algorithm. Electronics Letters, 38(14), 705–706.CrossRef
Zurück zum Zitat Franklin, M. K., & Reiter, M. K. (1995). Verifiabe signature sharing. In Advances in cryptology, EUROCRYPT’95 (pp. 50–63). Lecture Notes in Computer Science 921. Franklin, M. K., & Reiter, M. K. (1995). Verifiabe signature sharing. In Advances in cryptology, EUROCRYPT’95 (pp. 50–63). Lecture Notes in Computer Science 921.
Zurück zum Zitat Franklin, M. K., & Reiter, M. K. (1996). The design and implementation of a secure auction service. IEEE Transactions on Software Engineering, 22(3), 302–312.CrossRef Franklin, M. K., & Reiter, M. K. (1996). The design and implementation of a secure auction service. IEEE Transactions on Software Engineering, 22(3), 302–312.CrossRef
Zurück zum Zitat Harkavy, M., Kikuch, H., & Tygar, J. D. (1998) Electronic auction with private commerce. In Proceedings of the 3rd USENLX workshop on electronic commerce, August. Harkavy, M., Kikuch, H., & Tygar, J. D. (1998) Electronic auction with private commerce. In Proceedings of the 3rd USENLX workshop on electronic commerce, August.
Zurück zum Zitat Hwang, M.-S., Lu, E. J.-L., & Lin, I.-C. (2002). Adding timestamps to the secure electronic auction protocol. Data & Knowledge Engineering, 40(2), 155–162.CrossRef Hwang, M.-S., Lu, E. J.-L., & Lin, I.-C. (2002). Adding timestamps to the secure electronic auction protocol. Data & Knowledge Engineering, 40(2), 155–162.CrossRef
Zurück zum Zitat Kawagoe, T. (1996). Electronic auction mechanism. In Proceedings of the symposium on information, Media’96 (pp. 75–82). August Kawagoe, T. (1996). Electronic auction mechanism. In Proceedings of the symposium on information, Media’96 (pp. 75–82). August
Zurück zum Zitat Kikuchi, H., Hakavy, M., & Tygar, D. (1999). Multi-round anonymous auction protocols. IEICE Transactions on Information and Systems, E82-D(4), 769–777. Kikuchi, H., Hakavy, M., & Tygar, D. (1999). Multi-round anonymous auction protocols. IEICE Transactions on Information and Systems, E82-D(4), 769–777.
Zurück zum Zitat Sakurai, K., & Miyazaki, S. (1999). A bulletin-board based digital auction scheme with bidding down strategy. In Proceedings of the international workshop on cryptographic techniques and E-commerce (pp. 180–187). HongKong City University, July. Sakurai, K., & Miyazaki, S. (1999). A bulletin-board based digital auction scheme with bidding down strategy. In Proceedings of the international workshop on cryptographic techniques and E-commerce (pp. 180–187). HongKong City University, July.
Zurück zum Zitat Kudo, M. (1998). Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Transactions on Fundamentals, E81-A(1), 20–27. Kudo, M. (1998). Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Transactions on Fundamentals, E81-A(1), 20–27.
Zurück zum Zitat Lee, B., Kim, K., & Ma, J. (2001). Efficient public auction with one-time registration and public verifiabiltiy. In Proceedings of Indocrypt2001 (pp. 16–20). Chennai, India: Madras. Lee, B., Kim, K., & Ma, J. (2001). Efficient public auction with one-time registration and public verifiabiltiy. In Proceedings of Indocrypt2001 (pp. 16–20). Chennai, India: Madras.
Zurück zum Zitat Lee, W.-B., & Chang, C.-C. (1995). Authenticated encryption schemes without using a one way function. Electronics Letters, 31(19), 1656–1657.CrossRef Lee, W.-B., & Chang, C.-C. (1995). Authenticated encryption schemes without using a one way function. Electronics Letters, 31(19), 1656–1657.CrossRef
Zurück zum Zitat Liu, S., Wang, C., & Wang, Y. (2000). A secure multi-round electronic auction scheme. In Proceedings of the EUROCOMM’2000 (pp. 330–334). Germany, May. Liu, S., Wang, C., & Wang, Y. (2000). A secure multi-round electronic auction scheme. In Proceedings of the EUROCOMM’2000 (pp. 330–334). Germany, May.
Zurück zum Zitat Nguyen, K., & Traoré, J. (2000). An online public auction protocol protecting bidder prvacy. In Proceedings of Australasian conference on information security and privacy, ACISP2000 (pp. 427–442). Nguyen, K., & Traoré, J. (2000). An online public auction protocol protecting bidder prvacy. In Proceedings of Australasian conference on information security and privacy, ACISP2000 (pp. 427–442).
Zurück zum Zitat Omote, K., & Miyaji, A. (2001). A practical english auction with one-time registration. In Proceedings of Australasian conference on information security and privacy, ACISP2001 (pp. 221–234). Omote, K., & Miyaji, A. (2001). A practical english auction with one-time registration. In Proceedings of Australasian conference on information security and privacy, ACISP2001 (pp. 221–234).
Zurück zum Zitat Rabin, T., & Ben-Or, M. (1989). Verifiable secret sharing and multiparty protocols with honest majority. In STOC’89 (pp. 73–85). Rabin, T., & Ben-Or, M. (1989). Verifiable secret sharing and multiparty protocols with honest majority. In STOC’89 (pp. 73–85).
Zurück zum Zitat Shamir, A. (1979). How to share a secret. Communications of the ACM, 22, 612–613.CrossRef Shamir, A. (1979). How to share a secret. Communications of the ACM, 22, 612–613.CrossRef
Zurück zum Zitat Subramanian, S. (1998). Design and verification of a secure electronic auction protocol. In IEEE 17th symposium on reliable distributed systems (pp. 204–210). Subramanian, S. (1998). Design and verification of a secure electronic auction protocol. In IEEE 17th symposium on reliable distributed systems (pp. 204–210).
Zurück zum Zitat Tseng, Y.-M., Jan, J.-K., & Chien, H.-Y. (2003). Authenticated encryption schemes with message linkages for message flows. Computers and Electrical Engineering, 29(1), 101–109.CrossRef Tseng, Y.-M., Jan, J.-K., & Chien, H.-Y. (2003). Authenticated encryption schemes with message linkages for message flows. Computers and Electrical Engineering, 29(1), 101–109.CrossRef
Zurück zum Zitat Zhang, F., Li, Q., & Wang, Y. (2000). A new secure electronic auction scheme. In Proceedings of the EUROCOMM 2000 (pp. 54–56). Germany, May. Zhang, F., Li, Q., & Wang, Y. (2000). A new secure electronic auction scheme. In Proceedings of the EUROCOMM 2000 (pp. 54–56). Germany, May.
Metadaten
Titel
A secure e-auction scheme based on group signatures
verfasst von
Cheng-Chi Lee
Pi-Fang Ho
Min-Shiang Hwang
Publikationsdatum
01.07.2009
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 3/2009
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-008-9094-3

Weitere Artikel der Ausgabe 3/2009

Information Systems Frontiers 3/2009 Zur Ausgabe

Premium Partner