A Secure and Efficient Protocol for Electronic Treasury Auctions

被引:0
作者
Bektas, Atilla [1 ]
Kiraz, Mehmet Sabir [2 ]
Uzunkol, Osmanbey [2 ]
机构
[1] Middle E Tech Univ, IAM, TR-06531 Ankara, Turkey
[2] TUBITAK BILGEM, MCS Labs, Kocaeli, Turkey
来源
CRYPTOGRAPHY AND INFORMATION SECURITY IN THE BALKANS | 2015年 / 9024卷
关键词
Treasury auctions; Secure multi-party computation; Threshold homomorphic encryption; Confidentiality; Privacy;
D O I
10.1007/978-3-319-21356-9_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Auctions have become an important part of electronic commerce. Considering the gradually increasing importance of confidentiality and privacy in auction modeling, various designs have been proposed to ensure secure transmission especially in sealed-bid auctions. However, to the best of our knowledge there is no secure and privacy preserving Treasury Auction system. Looking at systems currently in use, many countries perform those auctions manually. Since all the bids are transferred to the system in clear form, confidentiality and privacy are not guaranteed. Therefore, the system is more vulnerable to potential threats especially due to the ongoing advances and developments in technology. In a secure electronic auction system, it is possible to determine the winner or the winners without revealing any private information. In this work, we propose a new, secure and efficient electronic auction protocol for Treasury Auctions based on secure multi-party computation, secret sharing and threshold homomorphic cryptosystem.
引用
收藏
页码:123 / 140
页数:18
相关论文
共 27 条
  • [1] [Anonymous], 2011, Algorithms
  • [2] Bektas A., 2013, THESIS MIDDLE E TU N
  • [3] Ben-David A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P257
  • [4] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
  • [5] Bogdanov D., 2008, IACR CRYPTOL EPRINT, V2008, P289
  • [6] Bogdanov Dan., 2012, INT C FINANCIAL CRYP, P57
  • [7] Bogetoft P, 2009, LECT NOTES COMPUT SC, V5628, P325, DOI 10.1007/978-3-642-03549-4_20
  • [8] Brandt F, 2005, LECT NOTES COMPUT SC, V3570, P298
  • [9] On the existence of unconditionally privacy-preserving auction protocols
    Brandt, Felix
    Sandholm, Tuomas
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (02)
  • [10] Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214