Skip to main content

2017 | OriginalPaper | Buchkapitel

From Sealed-Bid Electronic Auction to Electronic Cheque

verfasst von : Kin-Woon Yeow, Swee-Huay Heng, Syh-Yuan Tan

Erschienen in: Information Science and Applications 2017

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we establish a relation between sealed-bid e-auction and e-cheque by proposing a transformation technique which transforms a secure sealed-bid e-auction into a secure e-cheque scheme. Although the application scenario differs, we notice that the scheme structure and fundamental security properties in both schemes are similar, namely, unforgeability, anonymity and indistinguishability. As a proof of concept, we apply the transformation technique on the classic Sakurai and Miyazaki sealed-bid e-auction scheme and obtain a secure e-cheque scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Chaum, D., Boer, B., Heyst, E., Mjølsnes, S., Steenbeek, A.: Efficient offline electronic checks. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 294–301. Springer, Heidelberg (1990). doi:10.1007/3-540-46885-4_31 Chaum, D., Boer, B., Heyst, E., Mjølsnes, S., Steenbeek, A.: Efficient offline electronic checks. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 294–301. Springer, Heidelberg (1990). doi:10.​1007/​3-540-46885-4_​31
3.
Zurück zum Zitat Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, New York (1990). doi:10.1007/0-387-34799-2_25 Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, New York (1990). doi:10.​1007/​0-387-34799-2_​25
4.
Zurück zum Zitat Chen, C.L., Wu, C.H., Lin, W.C.: Improving an on-line electronic check system with mutual authentication. In: International Conference on Advanced Information Technologies (2010) Chen, C.L., Wu, C.H., Lin, W.C.: Improving an on-line electronic check system with mutual authentication. In: International Conference on Advanced Information Technologies (2010)
6.
Zurück zum Zitat Chen, X., Lee, B., Kim, K.: Receipt-free electronic auction schemes using homomorphic encryption. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 259–273. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24691-6_20 CrossRef Chen, X., Lee, B., Kim, K.: Receipt-free electronic auction schemes using homomorphic encryption. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 259–273. Springer, Heidelberg (2004). doi:10.​1007/​978-3-540-24691-6_​20 CrossRef
7.
Zurück zum Zitat Franklin, M.K., Reiter, M.K.: The design and implementation of a secure auction service. In: Software Engineering, IEEE, pp. 302–312 (1996) Franklin, M.K., Reiter, M.K.: The design and implementation of a secure auction service. In: Software Engineering, IEEE, pp. 302–312 (1996)
8.
Zurück zum Zitat Hinarejos, M.F., Ferrer-Gomila, J.L., Draper-Gil, G., Huguet-Rotger, L.: Anonymity and transferability for an electronic bank check scheme, information. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 427–435 (2012) Hinarejos, M.F., Ferrer-Gomila, J.L., Draper-Gil, G., Huguet-Rotger, L.: Anonymity and transferability for an electronic bank check scheme, information. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 427–435 (2012)
9.
Zurück zum Zitat Howlader, J., Ghosh, A., Pal, T.D.R.: Secure receipt-free sealed-bid electronic auction. In: Ranka, S., Aluru, S., Buyya, R., Chung, Y.-C., Dua, S., Grama, A., Gupta, S.K.S., Kumar, R., Phoha, V.V. (eds.) IC3 2009. CCIS, vol. 40, pp. 228–239. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03547-0_22 CrossRef Howlader, J., Ghosh, A., Pal, T.D.R.: Secure receipt-free sealed-bid electronic auction. In: Ranka, S., Aluru, S., Buyya, R., Chung, Y.-C., Dua, S., Grama, A., Gupta, S.K.S., Kumar, R., Phoha, V.V. (eds.) IC3 2009. CCIS, vol. 40, pp. 228–239. Springer, Heidelberg (2009). doi:10.​1007/​978-3-642-03547-0_​22 CrossRef
10.
Zurück zum Zitat Howlader, J., Mal, A.K.: Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment. Secur. Commun. Netw. 8(18), 3415–3440 (2015)CrossRef Howlader, J., Mal, A.K.: Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment. Secur. Commun. Netw. 8(18), 3415–3440 (2015)CrossRef
11.
Zurück zum Zitat Kikuchi, H., Hakavy, M., Tygar, D.: Multi-round anonymous auction protocols (Special issue on internet technology and its applications). In: IEICE Transactions on Information and Systems, pp. 769–777 (1999) Kikuchi, H., Hakavy, M., Tygar, D.: Multi-round anonymous auction protocols (Special issue on internet technology and its applications). In: IEICE Transactions on Information and Systems, pp. 769–777 (1999)
12.
Zurück zum Zitat Lee, C.C., Ho, P.F., Hwang, M.S.: A secure e-Auction scheme based on group signatures. Inf. Syst. Front. 11(3), 335–343 (2009)CrossRef Lee, C.C., Ho, P.F., Hwang, M.S.: A secure e-Auction scheme based on group signatures. Inf. Syst. Front. 11(3), 335–343 (2009)CrossRef
13.
Zurück zum Zitat Li, M.J., Juan, J.S.T., Tsai, J.H.C.: Practical electronic auction scheme with strong anonymity and bidding privacy. Inf. Sci. 181(12), 2576–2586 (2011)MathSciNetCrossRefMATH Li, M.J., Juan, J.S.T., Tsai, J.H.C.: Practical electronic auction scheme with strong anonymity and bidding privacy. Inf. Sci. 181(12), 2576–2586 (2011)MathSciNetCrossRefMATH
14.
Zurück zum Zitat Lu, R., Cao, Z., Dong, X.: Efficient ID-based one-time proxy signature and its application in e-Cheque. In: Cryptology and Network Security, pp. 153–167 (2006) Lu, R., Cao, Z., Dong, X.: Efficient ID-based one-time proxy signature and its application in e-Cheque. In: Cryptology and Network Security, pp. 153–167 (2006)
15.
Zurück zum Zitat Montenegro, J.A., Lopez, J.: A practical solution for sealed bid and multi-currency auctions. Comput. Secur. 45, 186–198 (2014)CrossRef Montenegro, J.A., Lopez, J.: A practical solution for sealed bid and multi-currency auctions. Comput. Secur. 45, 186–198 (2014)CrossRef
16.
Zurück zum Zitat Nojoumian, M., Stinson, D.R.: Efficient sealed-bid auction protocols using verifiable secret sharing. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 302–317. Springer, Cham (2014). doi:10.1007/978-3-319-06320-1_23 CrossRef Nojoumian, M., Stinson, D.R.: Efficient sealed-bid auction protocols using verifiable secret sharing. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 302–317. Springer, Cham (2014). doi:10.​1007/​978-3-319-06320-1_​23 CrossRef
17.
Zurück zum Zitat Pasupathinathan, V., Pieprzyk, J., Wang, H.: Privacy enhanced electronic cheque system. In: Seventh IEEE International Conference on E-Commerce Technology, CEC 2005, pp. 431–434 (2005) Pasupathinathan, V., Pieprzyk, J., Wang, H.: Privacy enhanced electronic cheque system. In: Seventh IEEE International Conference on E-Commerce Technology, CEC 2005, pp. 431–434 (2005)
18.
Zurück zum Zitat Sakurai, K., Miyazaki, S.: An anonymous electronic bidding protocol based on a new convertible group signature scheme. In: Dawson, E.P., Clark, A., Boyd, C. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 385–399. Springer, Heidelberg (2000). doi:10.1007/10718964_32 CrossRef Sakurai, K., Miyazaki, S.: An anonymous electronic bidding protocol based on a new convertible group signature scheme. In: Dawson, E.P., Clark, A., Boyd, C. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 385–399. Springer, Heidelberg (2000). doi:10.​1007/​10718964_​32 CrossRef
19.
Zurück zum Zitat Schoenmakers, B.: A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 148–164. Springer, Heidelberg (1999). doi:10.1007/3-540-48405-1_10 Schoenmakers, B.: A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 148–164. Springer, Heidelberg (1999). doi:10.​1007/​3-540-48405-1_​10
20.
Zurück zum Zitat Su, R.: A new efficient self-certified one-time short signature scheme from bilinear pairings. In: ChinaCOM Fourth International Conference on Communications and Networking in China, pp. 1–5 (2009) Su, R.: A new efficient self-certified one-time short signature scheme from bilinear pairings. In: ChinaCOM Fourth International Conference on Communications and Networking in China, pp. 1–5 (2009)
21.
Zurück zum Zitat Sun, Y., Chai, J., Liang, H., Ni, J., Yu, Y.: A secure and efficient e-Cheque protocol from chameleon hash function. In: 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 470–475 (2013) Sun, Y., Chai, J., Liang, H., Ni, J., Yu, Y.: A secure and efficient e-Cheque protocol from chameleon hash function. In: 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 470–475 (2013)
22.
23.
Zurück zum Zitat Viswanathan, K., Boyd, C., Dawson, E.: A three phased schema for sealed bid auction system design. In: Dawson, E.P., Clark, A., Boyd, C. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 412–426. Springer, Heidelberg (2000). doi:10.1007/10718964_34 CrossRef Viswanathan, K., Boyd, C., Dawson, E.: A three phased schema for sealed bid auction system design. In: Dawson, E.P., Clark, A., Boyd, C. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 412–426. Springer, Heidelberg (2000). doi:10.​1007/​10718964_​34 CrossRef
24.
Zurück zum Zitat Wu, C.C., Chang, C.C., Lin, I.C.: New sealed-bid electronic auction with fairness, security and efficiency. J. Comput. Sci. Technol. 23(2), 253–264 (2008)CrossRef Wu, C.C., Chang, C.C., Lin, I.C.: New sealed-bid electronic auction with fairness, security and efficiency. J. Comput. Sci. Technol. 23(2), 253–264 (2008)CrossRef
25.
Zurück zum Zitat Xiong, H., Qin, Z., Li, F.: An anonymous sealed-bid electronic auction based on ring signature. Int. J. Netw. Secur. 8(3), 235–242 (2009) Xiong, H., Qin, Z., Li, F.: An anonymous sealed-bid electronic auction based on ring signature. Int. J. Netw. Secur. 8(3), 235–242 (2009)
Metadaten
Titel
From Sealed-Bid Electronic Auction to Electronic Cheque
verfasst von
Kin-Woon Yeow
Swee-Huay Heng
Syh-Yuan Tan
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-4154-9_43

Neuer Inhalt