Some works about an electronic auction protocol have been proposed. An electronic auction protocol should satisfy the following seven properties: (a)Fair of bidders; (b)Security of bids; (c)Anonymity; (d)Validity of winning bids; (e)Non-repudiation; (f)Robustness; and (g)Efficient bidding points. As for anonymity, previous protocols assume some entities like a dealer or plural centers to be trusted. In this paper, anonymity is realized without a trusted center, maintaining both computational and round complexity low. Furthermore, we represent a bid efficiently by using binary trees: for 2k bidding points, the size of the representation of bids is just k. Previous works investigating a sealed-bid auction aim at "efficiency" but not "entertainment" seen in English auction. We introduce a new idea of entertainment to the opening phase by decreasing winner candidates little by little. Our protocol has the following three main features in addition to the above seven properties: perfect anonymity(a single non-trusted center), efficient bidding points and entertainment.
[1]
J. Doug Tygar,et al.
Electronic Auctions with Private Bids
,
1998,
USENIX Workshop on Electronic Commerce.
[2]
Ronald L. Rivest,et al.
The MD5 Message-Digest Algorithm
,
1992,
RFC.
[3]
T. Elgamal.
A public key cryptosystem and a signature scheme based on discrete logarithms
,
1984,
CRYPTO 1984.
[4]
Adi Shamir,et al.
PayWord and MicroMint: Two Simple Micropayment Schemes
,
1996,
Security Protocols Workshop.
[5]
Hiroaki Kikuchi,et al.
Multi-round Anonymous Auction Protocols
,
1999
.
[6]
Adi Shamir,et al.
How to share a secret
,
1979,
CACM.
[7]
Kazue Sako,et al.
An Auction Protocol Which Hides Bids of Losers
,
2000,
Public Key Cryptography.
[8]
Matthew K. Franklin,et al.
The Design and Implementation of a Secure Auction Service
,
1996,
IEEE Trans. Software Eng..