Some remarks on security of receipt-free E-auction

Yong Sork Her, Kenji Imamoto, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Recently, a receipt-free scheme is rising for a secure e-auction. The goal of a receipt-free scheme in an e-auction is to prevent a bid-rigging. If the bid-rigging happens in the e-auction. the winner can get the bidding item with an unreasonably low price. The first receipt-free scheme tea: the e-auction was proposed by Abe and Suzuki. Chen, Lee and Kim also proposed the extended receipt-free scheme. In this paper, we point out that the proposed receipt-free schemes do nor prevent perfectly the bid-rigging attack. Moreover, we indicate that a bid-collision is a possible cause of an e-auction. In the strict sense, the bid-collusion is different fro m the bid-rigging. In this paper, we do not present the scheme which can prevent the bid-collision attack. We compare the bid-rigging attack with the bid-collusion attack, and analyze the security of the existed receipt-free schemes in a viewpoint of the bidrigging attack and the bid-collusion attack.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
Pages560-563
Number of pages4
VolumeII
Publication statusPublished - 2005
Event3rd International Conference on Information Technology and Applications, ICITA 2005 - Sydney, Australia
Duration: Jul 4 2005Jul 7 2005

Other

Other3rd International Conference on Information Technology and Applications, ICITA 2005
CountryAustralia
CitySydney
Period7/4/057/7/05

Fingerprint

Tea

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Her, Y. S., Imamoto, K., & Sakurai, K. (2005). Some remarks on security of receipt-free E-auction. In Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005 (Vol. II, pp. 560-563). [1489023]

Some remarks on security of receipt-free E-auction. / Her, Yong Sork; Imamoto, Kenji; Sakurai, Kouichi.

Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005. Vol. II 2005. p. 560-563 1489023.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Her, YS, Imamoto, K & Sakurai, K 2005, Some remarks on security of receipt-free E-auction. in Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005. vol. II, 1489023, pp. 560-563, 3rd International Conference on Information Technology and Applications, ICITA 2005, Sydney, Australia, 7/4/05.
Her YS, Imamoto K, Sakurai K. Some remarks on security of receipt-free E-auction. In Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005. Vol. II. 2005. p. 560-563. 1489023
Her, Yong Sork ; Imamoto, Kenji ; Sakurai, Kouichi. / Some remarks on security of receipt-free E-auction. Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005. Vol. II 2005. pp. 560-563
@inproceedings{994fac6810c545748a3fb6c24d8aa5e8,
title = "Some remarks on security of receipt-free E-auction",
abstract = "Recently, a receipt-free scheme is rising for a secure e-auction. The goal of a receipt-free scheme in an e-auction is to prevent a bid-rigging. If the bid-rigging happens in the e-auction. the winner can get the bidding item with an unreasonably low price. The first receipt-free scheme tea: the e-auction was proposed by Abe and Suzuki. Chen, Lee and Kim also proposed the extended receipt-free scheme. In this paper, we point out that the proposed receipt-free schemes do nor prevent perfectly the bid-rigging attack. Moreover, we indicate that a bid-collision is a possible cause of an e-auction. In the strict sense, the bid-collusion is different fro m the bid-rigging. In this paper, we do not present the scheme which can prevent the bid-collision attack. We compare the bid-rigging attack with the bid-collusion attack, and analyze the security of the existed receipt-free schemes in a viewpoint of the bidrigging attack and the bid-collusion attack.",
author = "Her, {Yong Sork} and Kenji Imamoto and Kouichi Sakurai",
year = "2005",
language = "English",
isbn = "0769523161",
volume = "II",
pages = "560--563",
booktitle = "Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005",

}

TY - GEN

T1 - Some remarks on security of receipt-free E-auction

AU - Her, Yong Sork

AU - Imamoto, Kenji

AU - Sakurai, Kouichi

PY - 2005

Y1 - 2005

N2 - Recently, a receipt-free scheme is rising for a secure e-auction. The goal of a receipt-free scheme in an e-auction is to prevent a bid-rigging. If the bid-rigging happens in the e-auction. the winner can get the bidding item with an unreasonably low price. The first receipt-free scheme tea: the e-auction was proposed by Abe and Suzuki. Chen, Lee and Kim also proposed the extended receipt-free scheme. In this paper, we point out that the proposed receipt-free schemes do nor prevent perfectly the bid-rigging attack. Moreover, we indicate that a bid-collision is a possible cause of an e-auction. In the strict sense, the bid-collusion is different fro m the bid-rigging. In this paper, we do not present the scheme which can prevent the bid-collision attack. We compare the bid-rigging attack with the bid-collusion attack, and analyze the security of the existed receipt-free schemes in a viewpoint of the bidrigging attack and the bid-collusion attack.

AB - Recently, a receipt-free scheme is rising for a secure e-auction. The goal of a receipt-free scheme in an e-auction is to prevent a bid-rigging. If the bid-rigging happens in the e-auction. the winner can get the bidding item with an unreasonably low price. The first receipt-free scheme tea: the e-auction was proposed by Abe and Suzuki. Chen, Lee and Kim also proposed the extended receipt-free scheme. In this paper, we point out that the proposed receipt-free schemes do nor prevent perfectly the bid-rigging attack. Moreover, we indicate that a bid-collision is a possible cause of an e-auction. In the strict sense, the bid-collusion is different fro m the bid-rigging. In this paper, we do not present the scheme which can prevent the bid-collision attack. We compare the bid-rigging attack with the bid-collusion attack, and analyze the security of the existed receipt-free schemes in a viewpoint of the bidrigging attack and the bid-collusion attack.

UR - http://www.scopus.com/inward/record.url?scp=33646811545&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33646811545&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33646811545

SN - 0769523161

SN - 9780769523163

VL - II

SP - 560

EP - 563

BT - Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005

ER -