Abstract
With the emergence of business to business eCommerce conventional trading practices need to be adapted to the new electronic environment. One such trading practice is the call for tender (CFT) which is heavily used for trading perishable goods. A naive translation of the CFT to mediated eCommerce introduces new manipulation possibilities like identity masquerading, repudiation of messages etc. In a first step, we show how the basic CFT can be made robust against these security attacks. However, this approach does not eliminate fundamental economic design problems of the CFT itself. In a second step, we show how the CFT can be protected against attacks that damage the fairness and economic efficiency of a market by turning it into a secure sealed-bid auction protocol.
This work was supported in part by the European Commission under contracts IST-1999-11060, project eBroker, and IST-1999-10288, project OPELIX.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35658-7_21
Chapter PDF
Similar content being viewed by others
References
Christian Cachin. Efficient private bidding and auctions with an oblivious third party. In 5th ACM Conference on Computer and Communications Security, November 1999.
David Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, I(1), 1988.
David L. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28 (10): 1030–1044, October 1985.
Whitfield Diffie and Martin Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6): 644–654, November 1976.
Matthew K. Franklin and Michael K. Reiter. The design and implementation of a secure auction service. In Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, May 1995.
Alan O. Freier, Philip Karlton, and Paul C. Kocher. The SSL protocol version 3. 0. Internet Draft, November 1996.
David Goldschlag, Michael Reed, and Paul Syverson. Hiding routing information. In Information Hiding, number 1174 in Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, 1996.
M. Harkavy, H. Kikuchi, and J. D. Tygar. Auctions with private bids. In Third USENIX Workshop on Electronic Commerce, Boston, USA, September 1998.
ISO/IEC. Information technology — Open Systems Interconnection — The directory: Authentication framework, 1995.
Hiroaki Kikuchi, Michael Harkavy, and J.D. Tygar. Multi-round anonymous auction protocols. In Proceedings of the first IEEE Workshop on Dependable and Real-lime E-Commerce Systems, jun 1998.
Stefan Klein. The Emergence of Auctions on the World Wide Web. Springer-Verlag, Berlin Germany, 2000.
M. Kumar and S. I. Feldman. Business negotiations on the internet. Iac reports, IBM T.J. Watson Research Center, March 1998.
M. Kumar and S. I. Feldman. Internet auctions. Iac reports, IBM T.J. Watson Research Center, November 1998.
Manoj Kumar and Stuart I. Feldman. Internet auctions. In Proceedings of the 3rd USENIX Workshop on Electronic Commerce, aug 1998.
R. P. McAfee and J. McMillan. Auctions and bidding. Journal of Economic Literature, XXV: 699–738, 1987.
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC Press series on discrete mathematics and its applications. CRC Press, 1997. ISBN 0–8493–8523–7.
Moni Naor, Benny Pinkas, and Reuben Sumner. Privacy preserving auctions and mechanism design. In Proceedings of the first ACM Conference on Electronic Commerce, nov 1999.
Duane Nickull and Brian Eisenberg. ebxml technical architecture specification. Technical report, UN/CEFACT, October 2000.
U.S. National Institute of Standards and Technology NIST. The digital signature standard DSS. FIPS PUB 186–2, January 2000.
Michael Reed, Paul Syverson, and David Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16 (4), 1998.
Ron L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21 (2): 120–126, February 1978.
T. W. Sandholm. Limitations of the Vickrey auction in computational multiagent systems. In Victor Lesser, editor, Proc. of the first Int. Conference on Multi-Agent Systems. The MIT Press, Cambridge, MA, 1995.
Frank Stajano and Ross Anderson. The cocaine auction protocol: On the power of anonymous broadcast. In Proceedings of Financial Cryptography 99, number 1768 in Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, 1999.
Stuart G. Stubblebine and Paul F. Syverson. Fair on-line auctions without special trusted parties. In Proceedings of Financial Cryptography 99, number 1648 in Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, 1999.
Efraim Turban. Auctions and bidding on the internet: An assessment. Electronic Markets, 7 (4), 1997.
J. D. Tygar. Atomicity versus anonymity: Distributed transactions for electronic commerce. In Proc. of the 24th Int. Conference on Very Large Databases, pages 1–10, New York City, USA, 1998.
W. Vickrey. Counter specification, auctions, and competitive sealed tenders. The Journal of Finance, pages 9–37, 1961.
E. Wolff, M.T. Tu, and W. Lamersdorf. Using genetic algorithms to enable automated auctions. In Electronic Commerce and Web Technologies, number 1875 in Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Tafreschi, O.A., Schneider, M., Fankhauser, P., Mahleko, B., Tesch, T. (2003). From Call for Tenders to Sealed-Bid Auction for Mediated Ecommerce. In: Meersman, R., Aberer, K., Dillon, T. (eds) Semantic Issues in E-Commerce Systems. IFIP - The International Federation for Information Processing, vol 111. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35658-7_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-35658-7_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-1035-9
Online ISBN: 978-0-387-35658-7
eBook Packages: Springer Book Archive