Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3597))

Included in the following conference series:

  • 696 Accesses

Abstract

Electronic Commerce (EC) has made rapid progress in recent years. Internet auctions have become especially popular in EC. Recently, Jiang-Pan-Li (JPL) proposed an improvement on Chang et al.’s efficient anonymous auction protocols in order to overcome the security weakness in the initiation phase of Chang et al.’s protocol. The current paper, however, points out that JPL’s initiation protocol is inefficiently designed and then, two optimized initiation protocols are presented to resolve such problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kikuchi, H., Hakavy, M., Tygar, D.: Multi-round Anonymous Auction Protocols. IEICE Transactions on Information and System E82-D(4), 769–777 (1999)

    Google Scholar 

  2. Omote, K., Miyaji, A.: An Anonymous Sealed-bid Auction with a Feature of Entertainment. Transactions on Information Processing Society of Japan, 2049–2056 (2001)

    Google Scholar 

  3. Franklin, M.K., Reiter, M.K.: The Design and Implementation of a Secure Auction Service. IEEE Transactions on Software Engineering, 302–312 (1996)

    Google Scholar 

  4. Kudo, M.: Secure Electronic Sealed-bid Auction Protocol with Public Key Cryptography. IEICE Transactions on Fundamentals E81-A(1), 20–27 (1998)

    MathSciNet  Google Scholar 

  5. Omote, K., Miyaji, A.: A practical english auction with one-time registration. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 221–234. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Chang, C.C., Chang, Y.F.: Efficient Anonymous Auction Protocols with Freewheeling Bids. Computers & Security 22(8), 728–734 (2003)

    Article  Google Scholar 

  7. Jiang, R., Pan, L., Li, J.H.: An Improvement on Efficient Anonymous Auction Protocols. Computers & Security (2005); Articles in Press

    Google Scholar 

  8. Guttman, J.D.: Security Protocol Design via Authentication Tests. In: Proceedings of the 15th IEEE computer security foundations workshop. IEEE CS Press (2002)

    Google Scholar 

  9. Guttman, J.D., Thayer, F.J.: Authentication Tests and the Structure of Bundles. Theoretical Computer Science 283(2), 333–380 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  10. Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security 7(2/3), 191–230 (1999)

    Google Scholar 

  11. Hwang, M.S., Lin, I.C., Li, L.H.: A Simple Micro-payment Scheme. The Journal of Systems and Software 55, 221–229 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoon, EJ., Ryu, EK., Yoo, KY. (2005). Optimized Initiation Phases for Anonymous Auction Protocols. In: Shimojo, S., Ichii, S., Ling, TW., Song, KH. (eds) Web and Communication Technologies and Internet-Related Social Issues - HSI 2005. HSI 2005. Lecture Notes in Computer Science, vol 3597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527725_3

Download citation

  • DOI: https://doi.org/10.1007/11527725_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27830-6

  • Online ISBN: 978-3-540-31808-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics