A Secure E-Tender Submission Protocol

There is fundamental difference between a simple e-tender box and a traditional physical tender box. Access to the e-tender box has become a private activity in contrast with the public access to a traditional tender box. A significant opportunity is therefore created for malicious business collusion by use of a simple e-tender box even though it may have cryptographic keys. This indicates that a different approach to the e-tender box is needed. This paper presents a secure e-tender submission protocol to address the advanced security requirements in e-tender submission. The principles of commitment schemes have been applied to the protocol design to prevent submission time dispute and collusion between favoured parties. The protocol is assumed to run under the condition that all tendering parties (principal and tenderers) are dishonest players. The security analysis shows that the protocol meets its security goals under well known colluding scenarios.

[1]  Peeter Laud,et al.  New linking schemes for digital time-stamping , 1998, ICISC.

[2]  Ivan Damgård,et al.  Commitment Schemes and Zero-Knowledge Protocols , 1998, Lectures on Data Security.

[3]  Jean-Jacques Quisquater,et al.  Timestamps: main issues on their use and implementation , 1999, Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99).

[4]  宇根 正志,et al.  The security evaluation of time stamping schemes : the present situation and studies , 2001 .

[5]  Tsutomu Matsumoto,et al.  A Framework to Evaluate Security and Cost of Time Stamping Schemes , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[6]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[7]  Rong Du,et al.  Formal analysis of secure contracting protocol for e-tendering , 2006, ACSW.

[8]  Jan Willemson,et al.  Time-Stamping with Binary Linking Schemes , 1998, CRYPTO.

[9]  Stuart Haber,et al.  How to time-stamp a digital document , 1990, Journal of Cryptology.