A fair and secure group buying system based on arbitration computing mechanism

被引:1
作者
Chen, Chin-Ling [1 ,2 ]
Deng, Yong-Yuan [3 ]
机构
[1] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41349, Taiwan
[2] Changchun Univ Technol, Sch Informat Engn, Changchun 130600, Jilin, Peoples R China
[3] Chaoyang Univ Technol, Dept Informat Management, Taichung 41349, Taiwan
关键词
Arbitration computing; Anonymity; Group buying; Message recovery; Non-repudiation; Secure computing; PRIVACY; AUTHENTICATION; INTERNET; SCHEME;
D O I
10.1007/s00500-016-2313-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Trading is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain a reasonable profit. If friends or family of a buyer are interested in the same commodity or service, they can often buy at a lower price by buying in volume. This concept is referred to as group buying. Although the profit on a single commodity decreases for a merchant, the overall profits are increased due to volume. Traditionally, buyers and merchants trade through a group buying service company. However, sometimes transaction disputes arise. This might happen because a buyer has already paid through a group buying service company but has not received the merchandise or because a merchant has delivered merchandise to a buyer but has not been paid. Transaction disputes arise. We propose a fair group buying system. The proposed scheme uses secure computing theory to meet the security requirements such as mutual authentication, integrity of transaction data and anonymity of buyer. We propose a fair and secure group buying system based on arbitration computing mechanism to provide a comprehensive method for arbitrating an appeal. We create a win/win situation for the buyers, the merchants and the group buying service companies.
引用
收藏
页码:119 / 135
页数:17
相关论文
共 29 条
[1]  
[Anonymous], ACM T COMPUTER SYSTE
[2]  
[Anonymous], 1997, Handbook of Applied Cryptography
[3]  
[Anonymous], LNCS LNAI
[4]  
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[5]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[6]   A fair online payment system for digital content via subliminal channel [J].
Chen, Chin-Ling ;
Liao, Jyun-Jie .
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2011, 10 (03) :279-287
[7]   Group-Buying E-Commerce in China [J].
Chung, Wingyan ;
Chen, Li .
IT PROFESSIONAL, 2012, 14 (04) :24-30
[8]  
Daemen J., 2002, DESIGN RIJNDAEL AES, DOI DOI 10.1007/978-3-662-04722-4
[9]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[10]  
Feng ZN, 2014, IEEE INFOCOM SER, P1231, DOI 10.1109/INFOCOM.2014.6848055