Adding timestamps to the secure electronic auction protocol

被引:30
作者
Hwang, MS
Lu, EJL
Lin, IC
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Wufeng 413, Taichung County, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chaiyi, Taiwan
关键词
auction; cryptography; security;
D O I
10.1016/S0169-023X(01)00048-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Subramanian proposed a secure electronic auction protocol. It was claimed that the auction protocol ensured anonymity, security, privacy, atomicity, and low overhead. However, the sensitive information of payment, such as credit card number, can be revealed by the auctioneer. The bid can be forged by a malicious auctioneer. Also, the situation of two or more bidders who offered the same price was not resolved efficiently. In this paper, we will improve the robustness of this electronic auction protocol. (C) 2002 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:155 / 162
页数:8
相关论文
共 10 条
[1]   The design and implementation of a secure auction service [J].
Franklin, MK ;
Reiter, MK .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (05) :302-312
[2]  
HWANG MS, 1994, IEICE T INF SYST, VE77D, P1042
[3]   A simple micro-payment scheme [J].
Hwang, MS ;
Lin, IC ;
Li, LH .
JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 55 (03) :221-229
[4]  
INOUE S, 1995, 955 IEICE ISEC
[5]  
Kawano T., 1996, Proceedings of the Kanto-Tosan Plant Protection Society, P75
[6]  
Kikuchi H, 1999, IEICE T INF SYST, VE82D, P769
[7]  
Kudo M, 1998, IEICE T FUND ELECTR, VE81A, P20
[8]  
NAKANISHI T, 1994, 943 IEICE ISEC
[9]  
NURMI H, 1994, P RES TRENDS THEOR C, P317
[10]   Design and verification of a secure electronic auction protocol [J].
Subramanian, S .
SEVENTEENTH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 1998, :204-210