Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions

In recent years, the online auction of consumers’ goods is an increasingly popular selling channel. To copy with this tendency, the bidders’ convenience and security have to be considered. Some online auctions (such as eBay or Amazon) introduced a proxy bidding strategy that the bidder can decide a maximum bid and delegate his authority to a legal agent to automatically outbid other competitors for the last winner. In this paper, we identify some practical issues in the current bidding strategies and propose a system model of a pairing-based proxy signcryption which includes two cryptographic schemes; further, we apply the proposed schemes to the online proxy auction system for comparing two authorized online proxy auction policies (agents anonymity setting and agents accountability setting) with different applications of short message and long message. Also, we discuss some critical security issues under the online proxy auctions. DOI: http://dx.doi.org/10.5755/j01.itc.43.4.6348

[1]  Hyungkyu Yang,et al.  Self-certified identity information using the minimum knowledge , 1996, Proceedings of Digital Processing Applications (TENCON '96).

[2]  Chien-Lung Hsu,et al.  Efficient proxy signature schemes using self-certified public keys , 2004, Appl. Math. Comput..

[3]  Siu-Ming Yiu,et al.  Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.

[4]  Shahrokh Saeednia Identity-Based and Self-Certified Key-Exchange Protocols , 1997, ACISP.

[5]  Katia P. Sycara,et al.  Mechanism design for coalition formation and cost sharing in group-buying markets , 2004, Electron. Commer. Res. Appl..

[6]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[7]  Gwoboa Horng,et al.  A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME , 2011 .

[8]  Zuhua Shao,et al.  Self-certified signature scheme from pairings , 2007, J. Syst. Softw..

[9]  Patrick Horster,et al.  Self-certified keys — Concepts and Applications , 1997 .

[10]  Robert J. Kauffman,et al.  Economics and Electronic Commerce: Survey and Directions for Research , 2001, Int. J. Electron. Commer..

[11]  Marc Girault,et al.  Self-Certified Public Keys , 1991, EUROCRYPT.

[12]  Alok Gupta,et al.  Analysis and Design of Business - to - Consumer Online Auctions , 2003, Manag. Sci..

[13]  Jussipekka Leiwo,et al.  An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .

[14]  Tzu-Chun Lin,et al.  GENERALIZATION OF PROXY SIGNATURE BASED ON FACTORIZATION , 2011 .

[15]  Han-Yu Lin,et al.  Efficient proxy signcryption scheme with provable CCA and CMA security , 2010, Comput. Math. Appl..

[16]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[17]  Rong-Hwa Huang,et al.  Key success factors for online auctions: Analysis of auctions of fashion clothing , 2011, Expert Syst. Appl..

[18]  Zhong Chen,et al.  Bidder-anonymous English auction protocol based on revocable ring signature , 2012, Expert Syst. Appl..

[19]  Kefei Chen,et al.  Identity based proxy-signcryption scheme from pairings , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.

[20]  Kwai-Sang Chin,et al.  Design of optimal double auction mechanism with multi-objectives , 2011, Expert Syst. Appl..

[21]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[22]  Woei-Jiunn Tsaur,et al.  Several security schemes constructed using ECC-based self-certified public key cryptosystems , 2005, Appl. Math. Comput..

[23]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[24]  Zhenfu Cao,et al.  Two Proxy Signcryption Schemes from Bilinear Pairings , 2005, CANS.

[25]  Zuhua Shao,et al.  Security of self-certified signatures , 2009, Inf. Process. Lett..

[26]  Meng Wang,et al.  Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability , 2005, ICCNMC.

[27]  Abraham Seidmann,et al.  Managing Online Auctions: Current Business and Research Issues , 2003, Manag. Sci..