Skip to main content
Top
Published in: Information Systems Frontiers 1/2013

01-03-2013

Comment on Lee et al.’s group signature and e-auction scheme

Authors: Yanbin Sun, Yan Sun, Mingxing Luo, Lize Gu, Shihui Zheng, Yixian Yang

Published in: Information Systems Frontiers | Issue 1/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently, Lee et al. used their new group signature with the function of authenticated encryption to design a sealed-bid auction scheme, and they claimed that their schemes are secure. In this paper, we show that if the group manager has a valid group signature of a member, without the member’s secret key, he can forge a group signature on arbitrary message on behalf of the member; then, if the registration manager (RM) and the auction manager (AM) conspired (with each other) in their auction scheme, they can forge a new bid on any goods on behalf of the bidder who has sent his/her bid to AM. Therefore, their group signature and auction scheme are insecure. Finally, we improve Lee et al.’s group signature scheme to overcome the modification attack and achieve the security requirements.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Authenticated encryption is the digital signature with a message recovery function. It can combine with the functions of digital signature and encryption.
 
Literature
go back to reference Chang, C. C., & Chang, Y. F. (2003). Efficient anonymous auction protocols with freewheeling bids. Computers & Security, 22(8), 728–734.CrossRef Chang, C. C., & Chang, Y. F. (2003). Efficient anonymous auction protocols with freewheeling bids. Computers & Security, 22(8), 728–734.CrossRef
go back to reference Chaum, D., & Heyst, E. (1991). Group signatures. In Advances in cryptology, Eurocrypt’91 (pp. 257–265). Chaum, D., & Heyst, E. (1991). Group signatures. In Advances in cryptology, Eurocrypt’91 (pp. 257–265).
go back to reference Chung, Y. F., Huang, K. H., Lee, H. H., Lai, F. P., & Chen, T. S. (2008). Bidder-anonymous English auction scheme with privacy and public verifiability. The Journal of Systems and Software, 81(1), 113–119.CrossRef Chung, Y. F., Huang, K. H., Lee, H. H., Lai, F. P., & Chen, T. S. (2008). Bidder-anonymous English auction scheme with privacy and public verifiability. The Journal of Systems and Software, 81(1), 113–119.CrossRef
go back to reference Juang, W. S., Liaw, H. T., Lin, P. C., & Lin, C. K. (2005). The design of a secure and fair sealed-bid auction service. Mathematical and Computer Modelling, 41(8–9), 973–985.CrossRef Juang, W. S., Liaw, H. T., Lin, P. C., & Lin, C. K. (2005). The design of a secure and fair sealed-bid auction service. Mathematical and Computer Modelling, 41(8–9), 973–985.CrossRef
go back to reference Kudo, M. (1998). Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Transactions on Fundamentals, E81-A(1), 20–27. Kudo, M. (1998). Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Transactions on Fundamentals, E81-A(1), 20–27.
go back to reference Lee, C. C., Ho, P. F., & Hwang, M. S. (2009). A secure e-aution scheme based on group signatures. Information Systems Frontiers, 11(3), 335–343.CrossRef Lee, C. C., Ho, P. F., & Hwang, M. S. (2009). A secure e-aution scheme based on group signatures. Information Systems Frontiers, 11(3), 335–343.CrossRef
go back to reference Lee, B., Kim, K., & Ma, J. (2001). Efficient public auction with one-time registration and public verifiabiltiy. In Progress in cryptology, INDOCRYPT 2001 (pp. 16–20). Chennai, India: Madras. Lee, B., Kim, K., & Ma, J. (2001). Efficient public auction with one-time registration and public verifiabiltiy. In Progress in cryptology, INDOCRYPT 2001 (pp. 16–20). Chennai, India: Madras.
go back to reference Omote, K., & Miyaji, A. (2001). A practical english auction with one-time registration. In Proceedings of Australasian conference on information security and privacy, ACISP2001 (pp. 221–234). Omote, K., & Miyaji, A. (2001). A practical english auction with one-time registration. In Proceedings of Australasian conference on information security and privacy, ACISP2001 (pp. 221–234).
go back to reference Wu, T. C., Chen, K. Y., & Lin, Z. Y. (2002). An English auction mechanism for Internet environment. In Proceedings of ISC 2002 (pp. 331–337). Wu, T. C., Chen, K. Y., & Lin, Z. Y. (2002). An English auction mechanism for Internet environment. In Proceedings of ISC 2002 (pp. 331–337).
Metadata
Title
Comment on Lee et al.’s group signature and e-auction scheme
Authors
Yanbin Sun
Yan Sun
Mingxing Luo
Lize Gu
Shihui Zheng
Yixian Yang
Publication date
01-03-2013
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 1/2013
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-011-9312-2

Other articles of this Issue 1/2013

Information Systems Frontiers 1/2013 Go to the issue

Premium Partner