Skip to main content

Electronic Sealed-Bid Auctions with Incoercibility

  • Conference paper
Electrical Power Systems and Computers

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 99))

Abstract

Electronic sealed-bid auctions are a method to establish the price of goods through the internet while keeping the bids secret during the bidding phase. In this paper, our concern is incoercibility of an auction protocol. This paper gives the first security model of incoercible sealed-bid auctions. By using undeniable signatures and deniable encryptions as building blocks, an efficient sealed-bid auction protocol with incoercibility is also proposed. Furthermore, our construction is proven to be secure in the random oracle model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abe, Suzuki: Receipt-free sealed-bid auction. In: ISW: International Workshop on Information Security, LNCS. Springer, Heidelberg (2002)

    Google Scholar 

  2. Bansal, N., Chen, N., Cherniavsky, N., Rurda, A., Schieber, B., Sviridenko, M.: Dynamic pricing for impatient bidders. ACM Transactions on Algorithms 6(2), 726–735 (2010)

    Article  MathSciNet  Google Scholar 

  3. Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90–104. Springer, Heidelberg (1997)

    Google Scholar 

  4. Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, Heidelberg (1990)

    Google Scholar 

  5. Chen, Lee, Kim: Receipt-free electronic auction schemes using homomorphic encryption. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, Springer, Heidelberg (2004)

    Google Scholar 

  6. Chida, Kobayashi, Morita: Efficient sealed-bid auctions for massive numbers of bidders with lump comparison. In: ISW: International Workshop on Information Security. LNCS. Springer, Heidelberg (2001)

    Google Scholar 

  7. Franklin, M.K., Reiter, M.K.: The design and implementation of a secure auction service. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1995, pp. 2–14. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press (1995)

    Google Scholar 

  8. Ha, J., Zhou, J., Moon, S.-J.: An improved double auction protocol against false bids. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 274–287. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Harkavy, M., Tygar, J.D., Kikuchi, H.: Electronic auctions with private bids. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 61–74 (1998)

    Google Scholar 

  10. Juels, Szydlo: A two-server, sealed-bid auction protocol. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Kikuchi, H., Harkavy, M., Tygar, J.D.: Multi-round anonymous auction protocols. In: Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pp. 62–69. Springer, Heidelberg (1998)

    Google Scholar 

  12. Kurosawa, K., Schmidt-Samoa, K.: New online/Offline signature schemes without random oracles. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 330–346. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Peng, Boyd, Dawson: A multiplicative homomorphic sealed-bid auction based on goldwasser-micali encryption. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, Springer, Heidelberg (2006)

    Google Scholar 

  14. Suzuki, K., Kobayashi, K., Morita, H.: Efficient sealed-bid auction using hash chain. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, p. 183. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gao, C., Yao, Za., Xie, D., Wei, B. (2011). Electronic Sealed-Bid Auctions with Incoercibility. In: Wan, X. (eds) Electrical Power Systems and Computers. Lecture Notes in Electrical Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21747-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21747-0_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21746-3

  • Online ISBN: 978-3-642-21747-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics