Advertisement

Optimized Initiation Phases for Anonymous Auction Protocols

  • Eun-Jun Yoon
  • Eun-Kyung Ryu
  • Kee-Young Yoo
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3597)

Abstract

Electronic Commerce (EC) has made rapid progress in recent years. Internet auctions have become especially popular in EC. Recently, Jiang-Pan-Li (JPL) proposed an improvement on Chang et al.’s efficient anonymous auction protocols in order to overcome the security weakness in the initiation phase of Chang et al.’s protocol. The current paper, however, points out that JPL’s initiation protocol is inefficiently designed and then, two optimized initiation protocols are presented to resolve such problems.

Keywords

Security Auction protocol Anonymity Efficiency Initiation protocol 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kikuchi, H., Hakavy, M., Tygar, D.: Multi-round Anonymous Auction Protocols. IEICE Transactions on Information and System E82-D(4), 769–777 (1999)Google Scholar
  2. 2.
    Omote, K., Miyaji, A.: An Anonymous Sealed-bid Auction with a Feature of Entertainment. Transactions on Information Processing Society of Japan, 2049–2056 (2001)Google Scholar
  3. 3.
    Franklin, M.K., Reiter, M.K.: The Design and Implementation of a Secure Auction Service. IEEE Transactions on Software Engineering, 302–312 (1996)Google Scholar
  4. 4.
    Kudo, M.: Secure Electronic Sealed-bid Auction Protocol with Public Key Cryptography. IEICE Transactions on Fundamentals E81-A(1), 20–27 (1998)MathSciNetGoogle Scholar
  5. 5.
    Omote, K., Miyaji, A.: A practical english auction with one-time registration. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 221–234. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  6. 6.
    Chang, C.C., Chang, Y.F.: Efficient Anonymous Auction Protocols with Freewheeling Bids. Computers & Security 22(8), 728–734 (2003)CrossRefGoogle Scholar
  7. 7.
    Jiang, R., Pan, L., Li, J.H.: An Improvement on Efficient Anonymous Auction Protocols. Computers & Security (2005); Articles in PressGoogle Scholar
  8. 8.
    Guttman, J.D.: Security Protocol Design via Authentication Tests. In: Proceedings of the 15th IEEE computer security foundations workshop. IEEE CS Press (2002)Google Scholar
  9. 9.
    Guttman, J.D., Thayer, F.J.: Authentication Tests and the Structure of Bundles. Theoretical Computer Science 283(2), 333–380 (2002)zbMATHCrossRefMathSciNetGoogle Scholar
  10. 10.
    Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security 7(2/3), 191–230 (1999)Google Scholar
  11. 11.
    Hwang, M.S., Lin, I.C., Li, L.H.: A Simple Micro-payment Scheme. The Journal of Systems and Software 55, 221–229 (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Eun-Jun Yoon
    • 1
  • Eun-Kyung Ryu
    • 1
  • Kee-Young Yoo
    • 1
  1. 1.Department of Computer EngineeringKyungpook National UniversityDaeguSouth Korea

Personalised recommendations