Secure Receipt-Free Sealed-Bid Electronic Auction
暂无分享,去创建一个
[1] Masayuki Abe,et al. M+1-st Price Auction Using Homomorphic Encryption , 2002, Public Key Cryptography.
[2] Dongho Won,et al. Information Security and Cryptology — ICISC 2000 , 2001, Lecture Notes in Computer Science.
[3] Jongin Lim,et al. Information Security and Cryptology - ICISC 2003 , 2003, Lecture Notes in Computer Science.
[4] Ernest F. Brickell,et al. Advances in Cryptology — CRYPTO’ 92 , 2001, Lecture Notes in Computer Science.
[5] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[6] J. Doug Tygar,et al. Electronic Auctions with Private Bids , 1998, USENIX Workshop on Electronic Commerce.
[7] Byoungcheon Lee,et al. Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption , 2003, ICISC.
[8] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[9] Josh Benaloh,et al. Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.
[10] Kunio Kobayashi,et al. Efficient Sealed-Bid Auction Using Hash Chain , 2000, ICISC.
[11] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[12] William Vickrey,et al. Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .
[13] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[14] Kouichi Sakurai,et al. A bulletin-board based digital auction scheme with bidding down strategy-towards anonymous electroni , 1999 .
[15] Hiroaki Kikuchi,et al. Multi-round Anonymous Auction Protocols , 1999 .
[16] Matthew K. Franklin,et al. The Design and Implementation of a Secure Auction Service , 1996, IEEE Trans. Software Eng..
[17] Michiharu Kudo,et al. Secure Electronic Sealed-Bid Auction Protocol with Public Key Cryptography (Special Section on Cryptography and Information Security) , 1998 .
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.
[19] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[20] Kazue Sako,et al. An Auction Protocol Which Hides Bids of Losers , 2000, Public Key Cryptography.
[21] Rafail Ostrovsky,et al. Deniable Encryption , 1997, IACR Cryptol. ePrint Arch..
[22] Kouichi Sakurai,et al. An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme , 2000, ACISP.
[23] Masayuki Abe,et al. Receipt-Free Sealed-Bid Auction , 2002, ISC.