Skip to main content

A Practical English Auction with One-Time Registration

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2119))

Included in the following conference series:

Abstract

An English auction is the most familiar type of auctions. Generally, an electronic auction has mainly two entities, the registration manager(RM) who treats the registration of bidders, and the auction manager(AM) who holds auctions. Before starting an auction, a bidder who wants to participate in English auction is registered to RM with her/his information. An electronic English auction protocol should satisfy the following nine properties, (a)Anonymity, (b)Traceability, (c)No framing, (d)Unforgeability, (e)Fairness, (f)Verifiability, (g)Unlikability among different auctions, (h)Linkability in an auction, and (i)Efficiency of bidding. Furthermore from the practical point of view we add two properties (j)One-time registration and (k)Easy revocation. A group signature is adapted to an English auction in order to satisfy (a), (b), and (f)[18]. However such a direct adoption suffers from the most critical drawbacks of efficiency in group signatures. In this paper we propose more realistic electronic English auction scheme, which satisfies all of these properties. Four notable features of our scheme are:

  1. (1)

    both of bidding and verification of bids are done quite efficiently by introducing a bulletin board,

  2. (2)

    anonymity for RM, AM and any participant can be realized to plural auctions by only one-time registration,

  3. (3)

    RM can easily revoke a bidder, and

  4. (4)

    nobody can impersonate any bidder

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A Practical and Provably Secure Coalition-Registant Group Signature Scheme. In Advances in Cryptology-CRYPTO2000, pages 255–270, 2000.

    Google Scholar 

  2. G. Ateniese and G. Tsudik. Some Open Issues and New Directions in Group Signatures. In Proceedings of Financial Cryptography’99, pages 196–211, 1999.

    Google Scholar 

  3. C. Cachin. Efficient Private Bidding and Auctions with an Oblivious Third Party. In Proceedings of 6th ACM Conference on Computer and Communications Security, pages 120–127, 1999.

    Google Scholar 

  4. J. Camenisch. Efficient and Generalized group signatures. In Advances in Cryptology-EUROCRYPT’97, pages 465–479, 1997.

    Google Scholar 

  5. J. Camenisch and M. Michels. A Group Signature Scheme with Improved Efficiency. In Advances in Cryptology-ASIACRYPT’98, pages 160–174, 1998.

    Google Scholar 

  6. J. Camenisch and M. Michels. Separability and Efficiency for Generic Group Signature Schemes. In Advances in Cryptology-CRYPTO’99, pages 106–121, 1999.

    Google Scholar 

  7. J. Camenisch and M. Stadler. Efficient Group Signature Schemes for Large Groups. In Advances in Cryptology-CRYPTO’97, pages 410–424, 1997.

    Google Scholar 

  8. D. Chaum and E. van Heyst. Group signatures. In Advances in Cryptology-EUROCRYPT’91, pages 257–265, 1991.

    Google Scholar 

  9. W. Diffie and M. Hellman. New direction in cryptography. IEEE Transactions on Information Theory, pages 644–654, November 1976.

    Google Scholar 

  10. M. Franklin and M. Reiter. The design and implementation of a secure auction service. IEEE Transactions on Software Engineering, 5:302–312, 1996.

    Article  Google Scholar 

  11. H. Kikuchi, M. Harkavy, and D. Tyger. Multi-round anonymous auction protocols. In Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pages 62–69, 1998.

    Google Scholar 

  12. J. Kilian and E. Petrank. Identity Escrow. In Advances in Cryptology-CRYPTO’98, pages 169–185, 1998.

    Google Scholar 

  13. K. Kobayashi, H. Morita, K. Suzuki, and M. Hakuta. Efficient Sealed-bid Auction by Using One-way Functions. IEICE Trans. Fundamentals, E84-A(1):289–294, 2001.

    Google Scholar 

  14. M. Kudo. Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals, E81-A(1):20–27, 1998.

    MathSciNet  Google Scholar 

  15. M. Kumar and S. Feldman. Internet Auctions. In Proceedings of the Third USENIX Workshop on Electronic Commerce, pages 49–60, 1998.

    Google Scholar 

  16. T. Mullen and M. Wellman. The auction manager: Market middleware for largescale electronic commerce. In Proceedings of the Third USENIX Workshop on Electronic Commerce, pages 49–60, 1998.

    Google Scholar 

  17. M. Naor, B. Pinkas, and R. Sumner. Privacy Preserving Auctions and Mechanism Design. In Proceedings of ACM Workshop on Electronic Commerce, pages 120–127, 1999.

    Google Scholar 

  18. K. Nguyen and J. Traoré. An Online Public Auction Protocol Protecting Bidder Privacy. In Information Security and Privacy (ACISP2000), pages 427–442, 2000.

    Google Scholar 

  19. K. Omote and A. Miyaji. An anonymous auction protocol with a single non-trusted center using binary trees. In Proceedings of ISW2000, pages 108–120, 2000.

    Google Scholar 

  20. R.L. Rivest and A. Shamir. Payword and micromint: Two simple micropayment schemes. In Proceedings of Security Protocols, pages 69–87, 1996.

    Google Scholar 

  21. K. Sako. An Auction Protocol Which Hides Bids of Losers. In Proceedings of PKC2000, pages 422–432, 2000.

    Google Scholar 

  22. K. Sakurai and S. Miyazaki. An anonymous electronic bidding protocol based on a new convertible group signature scheme. In Proceedings of ACISP2000, pages 385–399, 2000.

    Google Scholar 

  23. Stuart G. Stubblebine and Paul F. Syverson. Fair On-line Auctions Without Special Trusted Parties. In Proceedings of Financial Cryptography’99, pages 230–240, 1999.

    Google Scholar 

  24. K. Suzuki, K. Kobayashi, and H. Morita. Efficient sealed-bid auction using hash chain. In Proceedings of ICISC 2000, pages 189–197, 2000.

    Google Scholar 

  25. J. Zhou and D. Gollmann. A fair non-repudiation protocol. In Proceedings of 1996 IEEE Symposium on Security and Privacy, pages 55–61, 1996.

    Google Scholar 

  26. J. Zhou and D. Gollmann. An efficient non-repudiation protocol. In Proceedings of the 10th Computer Security Foundations Workshop (PCSFW). IEEE Computer Society Press, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Omote, K., Miyaji, A. (2001). A Practical English Auction with One-Time Registration. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-47719-5_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42300-3

  • Online ISBN: 978-3-540-47719-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics