An Anonymous Auction Protocol Based on GDH Assumption
نویسندگان
چکیده
The popularization and conveniences of Internet have changed traditional auction transactions into electronic auction via Internet. In 2006, Chang and Chang proposed an anonymous auction that enabled bidders to bid in anonymous cases without any bonds. However, in the initiation phase, the bidder is unable to be anonymous as there is no mechanism to protect his (her) identity. Therefore, the lawless person might take this chance to do something illegal. Once the latter, who participates in the auction activity, knows the bidder’s identity, he may threaten the honest bidder to become the bid winner. This situation may make bidders refuse to bid to avoid damages. To solve the above mentioned matter, in this paper, we propose an efficient anonymous auction protocol, to protect all bidders’ identities in both initiation and auction phases with low levels of computation and communication: only 27% and 50% of Chang and Chang protocol, respectively. A problem in anonymous auction protocol is that bidder A impersonates bidder B to participate an auction. This may be harmful to bidder B. We prove the proposed auction protocol is secure against this attack as it is based on the Gap Diffie-Hellman (GDH) assumption.
منابع مشابه
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2 parties. This gives rise to the generalized Diffie-Hellman assumption (GDH-Assumption). Naor and Reingold have recently shown an efficient construction of pseudo-random functions and proved its security based on the GDH-Assumption. In this note, we prove that breaking this assumption modulo a so called Blum-integer woul...
متن کاملAn Anonymous Sealed-bid Electronic Auction Based on Ring Signature
Privacy and anonymity have become two factors of increasing importance in auction protocol. This paper provides an efficient sealed-bid electronic auction protocol based on the technique of ring signature and verifiable technique of encryption key chain. The peculiar characteristics of our protocol are non-repudiation of bidders but preserving their anonymity and allowing the auctioneer to dete...
متن کاملGeneralized Diffie-Hellman Modulo a Composite is not Weaker than Factoring
The Diie-Hellman key-exchange protocol may naturally be extended to k > 2 parties. This gives rise to the generalized Diie-Hellman assumption (GDH-Assumption). Naor and Reingold have recently shown an eecient construction of pseudo-random functions and reduced the security of their construction to the GDH-Assumption. In this note, we prove that breaking this assumption modulo a composite would ...
متن کاملThe Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental communication primitive is necessarily one-to-one, so protocols addressing anonymity tend to resort to the composition of multiple elementary transmissions in order to frustrate traffic analysis. This paper builds on a case st...
متن کاملEfficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption
Oblivious Transfer (OT) is a simple, yet fundamental primitive which suffices to achieve almost every cryptographic application. In a recent work (Latincrypt ‘15), Chou and Orlandi (CO) present the most efficient, fully UC-secure OT protocol to date and argue its security under the CDH assumption. Unfortunately, a subsequent work by Genc et al. (Eprint ‘17) exposes a flaw in their proof which r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 12 شماره
صفحات -
تاریخ انتشار 2011