Advertisement

Electronic Sealed-Bid Auctions with Incoercibility

  • Chongzhi Gao
  • Zheng-an Yao
  • Dongqing Xie
  • Baodian Wei
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 99)

Abstract

Electronic sealed-bid auctions are a method to establish the price of goods through the internet while keeping the bids secret during the bidding phase. In this paper, our concern is incoercibility of an auction protocol. This paper gives the first security model of incoercible sealed-bid auctions. By using undeniable signatures and deniable encryptions as building blocks, an efficient sealed-bid auction protocol with incoercibility is also proposed. Furthermore, our construction is proven to be secure in the random oracle model.

Keywords

Electronic Sealed-bid Auctions Incoercibility Undeniable Signatures Deniable Encryptions 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abe, Suzuki: Receipt-free sealed-bid auction. In: ISW: International Workshop on Information Security, LNCS. Springer, Heidelberg (2002)Google Scholar
  2. 2.
    Bansal, N., Chen, N., Cherniavsky, N., Rurda, A., Schieber, B., Sviridenko, M.: Dynamic pricing for impatient bidders. ACM Transactions on Algorithms 6(2), 726–735 (2010)CrossRefMathSciNetGoogle Scholar
  3. 3.
    Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90–104. Springer, Heidelberg (1997)Google Scholar
  4. 4.
    Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, Heidelberg (1990)Google Scholar
  5. 5.
    Chen, Lee, Kim: Receipt-free electronic auction schemes using homomorphic encryption. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, Springer, Heidelberg (2004)Google Scholar
  6. 6.
    Chida, Kobayashi, Morita: Efficient sealed-bid auctions for massive numbers of bidders with lump comparison. In: ISW: International Workshop on Information Security. LNCS. Springer, Heidelberg (2001)Google Scholar
  7. 7.
    Franklin, M.K., Reiter, M.K.: The design and implementation of a secure auction service. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1995, pp. 2–14. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press (1995)Google Scholar
  8. 8.
    Ha, J., Zhou, J., Moon, S.-J.: An improved double auction protocol against false bids. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 274–287. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Harkavy, M., Tygar, J.D., Kikuchi, H.: Electronic auctions with private bids. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 61–74 (1998)Google Scholar
  10. 10.
    Juels, Szydlo: A two-server, sealed-bid auction protocol. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Kikuchi, H., Harkavy, M., Tygar, J.D.: Multi-round anonymous auction protocols. In: Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pp. 62–69. Springer, Heidelberg (1998)Google Scholar
  12. 12.
    Kurosawa, K., Schmidt-Samoa, K.: New online/Offline signature schemes without random oracles. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 330–346. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    Peng, Boyd, Dawson: A multiplicative homomorphic sealed-bid auction based on goldwasser-micali encryption. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, Springer, Heidelberg (2006)Google Scholar
  14. 14.
    Suzuki, K., Kobayashi, K., Morita, H.: Efficient sealed-bid auction using hash chain. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, p. 183. Springer, Heidelberg (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Chongzhi Gao
    • 1
    • 2
  • Zheng-an Yao
    • 3
  • Dongqing Xie
    • 1
  • Baodian Wei
    • 4
  1. 1.School of Computer ScienceGuangzhou UniversityGuangzhouChina
  2. 2.Key Laboratory of Network Security and CryptologyFujian Normal UniversityFuzhouChina
  3. 3.College of Mathematic and Computational ScienceSun Yat-Sen UniversityGuangZhouChina
  4. 4.Department of Electronics and Communication EngineeringSun Yat-sen UniversityGuangzhouChina

Personalised recommendations