Practical electronic auction scheme with strong anonymity and bidding privacy

In 2003, Chang and Chang proposed an efficient and anonymous auction protocol with freewheeling bids. They claimed that their scheme could ensure the bidders' anonymity and secure confidentiality. Later, Jiang et al. pointed out that their scheme could not withstand the man-in-the-middle attacks; during this time, Jiang et al. proposed an improved scheme based on the scheme by Chang and Chang. In 2006, Chang and Chang proposed an anonymous auction scheme that was much more efficient than the abovementioned schemes. However, all of these three schemes were unable to achieve strong anonymity, bidding privacy, and secret bidding prices for sealed-bids. This article proposes a new scheme to resolve the above problems in which two managers and zero knowledge proof are used. The proposed scheme can be widely applied in any sensitive auction (e.g., auctions of cosmetics, medical services, etc.). Moreover, the proposed scheme also satisfies the following requirements: (1) bidding privacy, (2) strong anonymity, (3) secret bidding prices, (4) unforgeability, (5) verifiability, (6) non-repudiation, (7) traceability, (8) one-time registration and (9) easy revocation.

[1]  James V. Hansen,et al.  Standards and verification for fair-exchange and atomicity in e-commerce transactions , 2006, Inf. Sci..

[2]  Atsuko Miyaji,et al.  A Practical English Auction with One-Time Registration , 2001, ACISP.

[3]  Vincent P. Crawford,et al.  A Dual Dutch Auction in Taipei: The Choice of Numeraire and Auction Form in Multi-Object Auctions with Bundling , 2000 .

[4]  Walter Baets,et al.  The impact of electronic markets: the case of the Dutch Flower Auctions , 1996, J. Strateg. Inf. Syst..

[5]  Jacques Traoré,et al.  An Online Public Auction Protocol Protecting Bidder Privacy , 2000, ACISP.

[6]  Kouichi Sakurai,et al.  English vs. sealed bid in anonymous electronic auction protocols , 2001, Proceedings Tenth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 2001.

[7]  David Chaum,et al.  Undeniable Signatures , 1989, CRYPTO.

[8]  Chin-Chen Chang,et al.  Enhanced anonymous auction protocols with freewheeling bids , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[9]  Kunio Kobayashi,et al.  Efficient Sealed-Bid Auction Using Hash Chain , 2000, ICISC.

[10]  Atsuko Miyaji,et al.  A Practical English Auction with Simple Revocation , 2002 .

[11]  Byoungcheon Lee,et al.  Efficient Public Auction with One-Time Registration and Public Verifiability , 2001, INDOCRYPT.

[12]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[13]  Christian Cachin,et al.  Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.

[14]  Yu-Fang Chung,et al.  Bidder-anonymous English auction scheme with privacy and public verifiability , 2008, J. Syst. Softw..

[15]  Jianhua Li,et al.  An improvement on efficient anonymous auction protocols , 2005, Comput. Secur..

[16]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[17]  Hugo Krawczyk,et al.  Advances in Cryptology - CRYPTO '98 , 1998 .

[18]  David C. Yen,et al.  A secure reverse Vickrey auction scheme with bid privacy , 2006, Inf. Sci..

[19]  Chin-Chen Chang,et al.  Efficient anonymous auction protocols with freewheeling bids , 2003, Comput. Secur..

[20]  Chin-Chen Chang,et al.  A countable and time-bound password-based user authentication scheme for the applications of electronic commerce , 2009, Inf. Sci..

[21]  Justie Su-tzu Juan,et al.  A Practical English Auction Based on the Discrete Logarithms , 2007, Security and Management.

[22]  Wen-Shenq Juang,et al.  The design of a secure and fair sealed-bid auction service, , 2005, Math. Comput. Model..

[23]  Joe Kilian,et al.  Identity Escrow , 1998, CRYPTO.

[24]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[25]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[26]  Michiharu Kudo,et al.  Secure Electronic Sealed-Bid Auction Protocol with Public Key Cryptography (Special Section on Cryptography and Information Security) , 1998 .