An Anonymous Sealed-bid Auction with a Feature of Entertainment
スポンサーリンク
概要
- 論文の詳細を見る
Some works about an electronic sealed-bid auction protocol^<1), 3), 5)~10), 15), 16), 18)> have been proposed. An electronic auction scheme should satisfy the following seven properties: (a)Fair of bidders; (b)Bid security; (c)Anonymity; (d)Validity of winning bids; (e)Nonrepudiation; (f)Robustness; and(g)Efficient bidding points. Many previous schemes do not realize anonymity for an auction manager. In this paper, we propose a new electronic sealed-bid auction that realizes anonymity for an auction manager, maintaining both computational and round complexity low. We represent a bid efficiently by using binary trees : for 2^k bidding points, the size of the representation of bids is just k. Furthermore, we introduce a new idea of entertainment to the opening phase by deoreasing winner candidates little by little. Our notion is very attractive and new since all previous works on a sealed-bid auction aim at "efficiency" but not "entertainment" seen in English auction. The main features of our scheme are: anonymity for a single AM, efficient bidding points and entertainment.
- 一般社団法人情報処理学会の論文
- 2001-08-15
著者
-
MIYAJI Atsuko
Japan Advanced Institute of Science and Technology
-
OMOTE Kazumasa
Japan Advanced Institute of Science and Technology
-
Omote Kazumasa
Japan Advanced Inst. Of Sci. And Technol. (jaist)
-
Omote K
Jaist Ishikawa‐ken Jpn
-
Miyaji Atsuko
Japan Advanced Inst. Of Sci. And Technol. Ishikawa‐ken Jpn
-
Miyaji Atsuko
Japan Advanced Inst. Of Sci. And Technol.
-
Omote Kazumasa
Japan Advanced Inst. Of Sci. And Technol.
関連論文
- Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- Sequential Bitwise Sanitizable Signature Schemes
- A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics
- Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
- Consideration of Lightweight Chameleon Hash Function (2)
- Generalized Scalar Multiplication Secure against SPA, DPA, and RPA
- The security of RC6 against asymmetric Chi-square test attack
- Evaluation of the Security of RC6 against the χ^2-Attack
- Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- A Second-price Sealed-bid Auction with Public Verifiability
- An Anonymous Sealed-bid Auction with a Feature of Entertainment
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- Software Obfuscation on a Theoretical Basis and Its Implementation
- Statistical Analysis of chi-square Attacks
- Cryptanalysis of Reduced-Round RC6 without Whitening
- Improved Correlation Attack on RC5
- A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order Verifiability
- New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
- Efficient Construction of Elliptic Curves over Optimal Extension Field
- Sequential Bitwise Sanitizable Signature Schemes
- Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point
- New Concrete Relation between Trace, Definition Field, and Embedding Degree
- Efficinet Group Signature Scheme Based on a Modified Nyberg-Rueppel Signature (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes
- Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack
- Methods for Restricting Message Space in Public-Key Encryption
- Improvement of Network coding-based System for Ensuring Data Integrity in Cloud Computing
- Improvement of Network coding-based System for Ensuring Data Integrity in Cloud Computing
- The Security of RC6 against Asymmetric Chi-square Test Attack
- The Security of RC6 against Asymmetric Chi-square Test Attack
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- Secure Dynamic Hourglass Protocol for Untrusted Server