A New Auction with Convertible Cryptosystem and Mutual Authentication
نویسندگان
چکیده
Electronic auction is popular due to rapid development of Internet technology. However, the identity and privacy of bidders are facing an insecure environment. Hence, a secure trade-off environment which can protect the privacy of bidders is necessary for auction. However, it never emerges as a reasonable and complete solution for the auction center to control the bidder’s privacy from contemporary research. The proposed protocol focuses on the English auction method that can reach mutual authentication between the bidders and auction center by Diffie-Hellman key exchange and can protect the security of message by applying convertible authentication cryptosystem during the transmission.
منابع مشابه
Convertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملA New Remote Authentication Scheme for Anonymous Users Using Elliptic Curves Cryptosystem
Along with the large-scale proliferation of network and information technology, users can obtain the information resources conveniently via intelligent device. Authentication mechanism is a fundamental tool for ensuring secure communications and the validity of communicating party. In this paper, we propose a new authentication scheme for anonymous users using elliptic curves cryptosystem (ECC)...
متن کاملA Secure and Efficient Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
Recently, Li et al. [20] proposed an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks to remedy the weaknesses of Rhee et al.’s scheme. Li et al.’s scheme not only achieves mutual authentication, but also provides the procedure for key agreement and updates of secrets for users and servers. However, we find that Li et al.’s scheme is ...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012