Sealed-bid Auction Schemes using Threshold Cryptosystem
نویسندگان
چکیده
This paper proposes a secure sealed-bid auction schemes which adopt threshold cryptosystem without a third party. In the previous proposed sealed-bid auction schemes, an auctioneer is responsible for opening bids. However, malicious auctioneers can conspire with malicious bidders by revealing all bidding prices before the bid opening stage for bidding optimal bidding price to win the auction. To prevent against this, we decide to eliminate auctioneer from opening phase and involve plural clerks to choose secret keys, and then clerks distribute public keys to each other. On the bid opening phase, the clerks can cooperate with each other to open the bids without an auctioneer by using Pedersen’s protocol and Lagrange interpolating polynomial. Hence, an auctioneer is only responsible for verifying user’s identification and checking whether bids are valid or not. Furthermore, for enhancing security in our schemes, we utilize a hardware framework entitled “Untraceable Decryptor” to make all bids pass through it when the bids are transferred to clerks.
منابع مشابه
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing
Although secret sharing techniques have been applied to implement secure electronic sealed-bid auction for a long time, problems and attacks still exist in secret-sharing-based electronic sealed-bid auction schemes. In this paper, a new secret-sharing-based first-bid e-auction scheme is designed to achieve satisfactory properties and efficiency. Correctness and fairness of the new auction are b...
متن کاملEfficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction
Bid opening in sealed-bid e-auction is efficient when a homomorphic encryption algorithm is employed to seal the bids and homomorphic bid opening is employed to open the bids. Such e-auction schemes are called homomorphic auctions. However, high efficiency of homomorphic auctions is based on an assumption: the bids are valid (e.g. within a special range). An undetected invalid bid can compromis...
متن کاملSealed-Bid Micro Auctions
In electronic auction applications, small-value merchandise is often distributed. We call this kind of auction micro auction. Compared to traditional general-purpose electronic auction, micro electronic auction has its own special requirements. Especially, micro auction must be very efficient: the cost of the auction protocol must not be over the cost of the merchandise for sale. Although the m...
متن کاملA Reverse Sealed-bid Auction System for Mobile Commerce
In recent years, the demand for mobile commerce has increased. Due to this increased demand, mobile devices usage in internet auctions has also increased. In this paper, we propose a reverse sealed-bid auction model using collaborative mobile agents (MoRSAS) which can be used on mobile-based environment. We also proposed a new auction protocol using ECC (Elliptic Curve Cryptosystem) based signc...
متن کاملElectronic Sealed-bid Auction with the Efficient Communication Complexity Using Tournament Opening-method
Recently, an electronic sealed-bid auction using cryptography techniques has been proposed. An electronic sealed-bid auction is a type of electronic auctions. The aim of an auction including an electronic sealed-bid auction is to decide the price of goods fairly. So, the decision method of the price on goods in an electronic auction is very important scheme. In this paper, we propose the electr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013