Abstract
Electronic sealed-bid auctions are a method to establish the price of goods through the internet while keeping the bids secret during the bidding phase. In this paper, our concern is incoercibility of an auction protocol. This paper gives the first security model of incoercible sealed-bid auctions. By using undeniable signatures and deniable encryptions as building blocks, an efficient sealed-bid auction protocol with incoercibility is also proposed. Furthermore, our construction is proven to be secure in the random oracle model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abe, Suzuki: Receipt-free sealed-bid auction. In: ISW: International Workshop on Information Security, LNCS. Springer, Heidelberg (2002)
Bansal, N., Chen, N., Cherniavsky, N., Rurda, A., Schieber, B., Sviridenko, M.: Dynamic pricing for impatient bidders. ACM Transactions on Algorithms 6(2), 726–735 (2010)
Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90–104. Springer, Heidelberg (1997)
Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, Heidelberg (1990)
Chen, Lee, Kim: Receipt-free electronic auction schemes using homomorphic encryption. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, Springer, Heidelberg (2004)
Chida, Kobayashi, Morita: Efficient sealed-bid auctions for massive numbers of bidders with lump comparison. In: ISW: International Workshop on Information Security. LNCS. Springer, Heidelberg (2001)
Franklin, M.K., Reiter, M.K.: The design and implementation of a secure auction service. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1995, pp. 2–14. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press (1995)
Ha, J., Zhou, J., Moon, S.-J.: An improved double auction protocol against false bids. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 274–287. Springer, Heidelberg (2005)
Harkavy, M., Tygar, J.D., Kikuchi, H.: Electronic auctions with private bids. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 61–74 (1998)
Juels, Szydlo: A two-server, sealed-bid auction protocol. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, Springer, Heidelberg (2003)
Kikuchi, H., Harkavy, M., Tygar, J.D.: Multi-round anonymous auction protocols. In: Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pp. 62–69. Springer, Heidelberg (1998)
Kurosawa, K., Schmidt-Samoa, K.: New online/Offline signature schemes without random oracles. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 330–346. Springer, Heidelberg (2006)
Peng, Boyd, Dawson: A multiplicative homomorphic sealed-bid auction based on goldwasser-micali encryption. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, Springer, Heidelberg (2006)
Suzuki, K., Kobayashi, K., Morita, H.: Efficient sealed-bid auction using hash chain. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, p. 183. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gao, C., Yao, Za., Xie, D., Wei, B. (2011). Electronic Sealed-Bid Auctions with Incoercibility. In: Wan, X. (eds) Electrical Power Systems and Computers. Lecture Notes in Electrical Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21747-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-21747-0_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21746-3
Online ISBN: 978-3-642-21747-0
eBook Packages: EngineeringEngineering (R0)