TY - GEN
T1 - An anonymous electronic bidding protocol Based on a new convertible group signature scheme-on the importance of hiding the winner’s identity against bid-rigging-
AU - Sakurai, Kouichi
AU - Miyazaki, Shingo
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2000.
Copyright:
Copyright 2016 Elsevier B.V., All rights reserved.
PY - 2000
Y1 - 2000
N2 - We propose an electronic auction scheme satisfying that (i) a group of colluding bidders cannot control the contract price arbitrarily, (ii) all prices of bidders except the winner are never revealed to anyone (even to the auction house), and (iii) only the auction house recognizes the winner’s identity, while the other losers can verify the fact that the winner belongs to the advanced registered group. Our scheme does not rely on an anonymous channel nor a trusted third center. Our system can be implemented only with the public-key technology and cryptographic hash functions and all bidders can verify the validity of process for determining a winner via a public bulletin board. To achieve stronger anonymity of the winner, we develop a new variant of convertible undeniable group signatures. In our designed signature scheme, the convertibility has two phases: one is convertible from online to off-line in verification-stage, and the other is convertible from individual to group.
AB - We propose an electronic auction scheme satisfying that (i) a group of colluding bidders cannot control the contract price arbitrarily, (ii) all prices of bidders except the winner are never revealed to anyone (even to the auction house), and (iii) only the auction house recognizes the winner’s identity, while the other losers can verify the fact that the winner belongs to the advanced registered group. Our scheme does not rely on an anonymous channel nor a trusted third center. Our system can be implemented only with the public-key technology and cryptographic hash functions and all bidders can verify the validity of process for determining a winner via a public bulletin board. To achieve stronger anonymity of the winner, we develop a new variant of convertible undeniable group signatures. In our designed signature scheme, the convertibility has two phases: one is convertible from online to off-line in verification-stage, and the other is convertible from individual to group.
UR - http://www.scopus.com/inward/record.url?scp=84958949541&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84958949541&partnerID=8YFLogxK
U2 - 10.1007/10718964_32
DO - 10.1007/10718964_32
M3 - Conference contribution
AN - SCOPUS:84958949541
SN - 3540677429
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 385
EP - 399
BT - Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings
A2 - Dawson, Ed
A2 - Clark, Andrew
A2 - Boyd, Colin
PB - Springer Verlag
T2 - 5th Australasian Conference on Information Security and Privacy, ACISP 2000
Y2 - 10 July 2000 through 12 July 2000
ER -