高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一种完全匿名和公平高效的拍卖协议

肖清华 平玲娣 潘雪增

肖清华, 平玲娣, 潘雪增. 一种完全匿名和公平高效的拍卖协议[J]. 电子与信息学报, 2005, 27(4): 666-669.
引用本文: 肖清华, 平玲娣, 潘雪增. 一种完全匿名和公平高效的拍卖协议[J]. 电子与信息学报, 2005, 27(4): 666-669.
Xiao Qing-hua, Ping Ling-di, Pan Xue-zeng . A Highly Efficient Secure Electronic Auction Protocol with Full Anonymity and Fairness[J]. Journal of Electronics & Information Technology, 2005, 27(4): 666-669.
Citation: Xiao Qing-hua, Ping Ling-di, Pan Xue-zeng . A Highly Efficient Secure Electronic Auction Protocol with Full Anonymity and Fairness[J]. Journal of Electronics & Information Technology, 2005, 27(4): 666-669.

一种完全匿名和公平高效的拍卖协议

A Highly Efficient Secure Electronic Auction Protocol with Full Anonymity and Fairness

  • 摘要: 为了保护电子拍卖过程中投标者的隐私,以及防止投标者中标后反悔,本文从利用签名技术和位承诺协议, 提出了一个安全有效的匿名拍卖协议。该协议不仅保证了标价的保密性和可验证性,投标者对所投标价的不可否认 性和匿名性,而且保证了在整个拍卖过程中,无人可以操纵其他人的投标。即使某一投标者与拍卖代理相互勾结, 也不会影响协议的安全性和有效性。更为重要的是,该协议遵循第二价位原理,从而使商品分配达到最优。与先前 的工作相比,该协议具有更好的扩展性和效率,适合于分布式的网上拍卖。
  • Mcafee R, Mcmillan J. Auction and bidding. Journal of Economic Literature, 1987, 25(6): 699 - 738.[2]Harkavy M, Kikuchi H, Tygra J D. Electronic auction with private bids. Proc. of the 3rd USENIX Workshop on Electronic Commerce, Massachusetts, USA, 1998:61 - 74.[3]Gaynor M, Megquier J, Sethaput V. Secure vickrey auction protocol. http:∥sonnet.eas.harvard.edu/auction/paper. html, 2000.[4]Vickrey W. Counterspeculation, auctions, and competitive sealed tenders[J].Journal of Finance.1961, 16(1):8-[5]Imamura Y, Matsumoto T, Imai H. Electronic anonymous bidding scheme. The 1994 Symposium on Cryptography and Information Security, Japanese, SCIS 94-11B, 1994: 152- 156.[6]Nakanishi T, Watanabc H, Fujiwara T, et al. An anonymous bidding protocol using undebiable signature. The 1995Symposium on Cryptography and Information Security, Japanese,SCIS95-15B, 1995: 106- 112.[7]Kudo M. Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans on Fundamentals of Electronics, Communications and Computer Science, 1998,E81-A(1): 20 - 27.[8]Kikuchi H.[J].Nakanishi S. Registration-free protocol for anonymous auction. Proc. of Computer Security Symposium98,London.1998,:-[9]Kikuchi H, Harkavy M, Tygar J D. Multi-round anonymous auction protocols. Proc. of the First IEEE Workshop on Dependable and Real Time E-Commerce Systems, New York,1998:62 - 69.[10]Shieh S P, Lin C T, Yang W B, et al.. Digital multisignature schemes for authenticating delegates in mobile code systems[J].IEEE Trans. on Veh. Tech.2000, 49(4):1464-[11]Bruce S. Applied cryptography second edition: Protocols,Algorithms, and Source Code in C. Beijing: China Machine Press,2000: 60- 61.[12]Kikuchi H. Power auction protocol without revealing wining bids.IEEE, 0-7695-0951-7, 2001:61 - 64.
  • 加载中
计量
  • 文章访问数:  2385
  • HTML全文浏览量:  105
  • PDF下载量:  821
  • 被引次数: 0
出版历程
  • 收稿日期:  2003-10-09
  • 修回日期:  2004-07-29
  • 刊出日期:  2005-04-19

目录

    /

    返回文章
    返回