Abstract
Electronic Commerce (EC) has made rapid progress in recent years. Internet auctions have become especially popular in EC. Recently, Jiang-Pan-Li (JPL) proposed an improvement on Chang et al.’s efficient anonymous auction protocols in order to overcome the security weakness in the initiation phase of Chang et al.’s protocol. The current paper, however, points out that JPL’s initiation protocol is inefficiently designed and then, two optimized initiation protocols are presented to resolve such problems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kikuchi, H., Hakavy, M., Tygar, D.: Multi-round Anonymous Auction Protocols. IEICE Transactions on Information and System E82-D(4), 769–777 (1999)
Omote, K., Miyaji, A.: An Anonymous Sealed-bid Auction with a Feature of Entertainment. Transactions on Information Processing Society of Japan, 2049–2056 (2001)
Franklin, M.K., Reiter, M.K.: The Design and Implementation of a Secure Auction Service. IEEE Transactions on Software Engineering, 302–312 (1996)
Kudo, M.: Secure Electronic Sealed-bid Auction Protocol with Public Key Cryptography. IEICE Transactions on Fundamentals E81-A(1), 20–27 (1998)
Omote, K., Miyaji, A.: A practical english auction with one-time registration. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 221–234. Springer, Heidelberg (2001)
Chang, C.C., Chang, Y.F.: Efficient Anonymous Auction Protocols with Freewheeling Bids. Computers & Security 22(8), 728–734 (2003)
Jiang, R., Pan, L., Li, J.H.: An Improvement on Efficient Anonymous Auction Protocols. Computers & Security (2005); Articles in Press
Guttman, J.D.: Security Protocol Design via Authentication Tests. In: Proceedings of the 15th IEEE computer security foundations workshop. IEEE CS Press (2002)
Guttman, J.D., Thayer, F.J.: Authentication Tests and the Structure of Bundles. Theoretical Computer Science 283(2), 333–380 (2002)
Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security 7(2/3), 191–230 (1999)
Hwang, M.S., Lin, I.C., Li, L.H.: A Simple Micro-payment Scheme. The Journal of Systems and Software 55, 221–229 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoon, EJ., Ryu, EK., Yoo, KY. (2005). Optimized Initiation Phases for Anonymous Auction Protocols. In: Shimojo, S., Ichii, S., Ling, TW., Song, KH. (eds) Web and Communication Technologies and Internet-Related Social Issues - HSI 2005. HSI 2005. Lecture Notes in Computer Science, vol 3597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527725_3
Download citation
DOI: https://doi.org/10.1007/11527725_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-27830-6
Online ISBN: 978-3-540-31808-8
eBook Packages: Computer ScienceComputer Science (R0)