A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy

In this paper, a sealed-bid multi-attribute auction protocol that mainly focuses on security issues (i.e., bid privacy, bidder anonymity, and fairness problem) is presented. In recent years, existing literatures mainly focus on the multi-attribute winner determination problem and other issues, but research of multi-attribute e-auction just begin from the perspective of information security. The new proposal is motivated by the conflict between bidder anonymity and denial-of-service attack from an insider. It utilizes private set intersection method to solve the privacy problem of winner determination of sealed-bid multi-attribute auction. The proposed sealed-bid auction scheme preserves the strong privacy of the bids and provides verifiable correctness. According to the security analysis, it satisfies the security requirements of an e-auction. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Che-Chern Lin,et al.  Automatic price negotiation on the web: An agent-based web application using fuzzy expert system , 2011, Expert Syst. Appl..

[2]  Justie Su-tzu Juan,et al.  Practical electronic auction scheme with strong anonymity and bidding privacy , 2011, Inf. Sci..

[3]  Chin-Laung Lei,et al.  Fair anonymous rewarding based on electronic cash , 2009, J. Syst. Softw..

[4]  Martin Bichler,et al.  Configurable offers and winner determination in multi-attribute auctions , 2005, Eur. J. Oper. Res..

[5]  David C. Parkes,et al.  Practical secrecy-preserving, verifiably correct and trustworthy auctions , 2006, ICEC '06.

[6]  Richard E. Crandall,et al.  Subexponential Factoring Algorithms , 2001 .

[7]  Vitaly Shmatikov,et al.  Privacy-Preserving Graph Algorithms in the Semi-honest Model , 2005, ASIACRYPT.

[8]  Hsu-Shih Shih,et al.  A hybrid MCDM model for strategic vendor selection , 2006, Math. Comput. Model..

[9]  R. K. Singh,et al.  A fuzzy TOPSIS based approach for e-sourcing , 2011, Eng. Appl. Artif. Intell..

[10]  Mamata Jenamani,et al.  A New Secure Protocol for Multi-attribute Multi-round E-reverse Auction Using Online Trusted Third Party , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.

[11]  Daniel H. Karney,et al.  Equilibria Existence and Characterization in Auctions: Achievements and Open Questions , 2012 .

[12]  Maria L. Gini,et al.  Design and implementation of a secure multi-agent marketplace , 2004, Electron. Commer. Res. Appl..

[13]  Ian Welch,et al.  A protocol for verification of an auction without revealing bid values , 2010, ICCS.

[14]  Yu-Fang Chung,et al.  An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce , 2011, Expert Syst. Appl..

[15]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[16]  Zhong Chen,et al.  Bidder-anonymous English auction protocol based on revocable ring signature , 2012, Expert Syst. Appl..

[17]  Jianhua Li,et al.  An improvement on efficient anonymous auction protocols , 2005, Comput. Secur..

[18]  Chin-Chen Chang,et al.  Efficient anonymous auction protocols with freewheeling bids , 2003, Comput. Secur..

[19]  Alwyn Roshan Pais,et al.  Anonymity and verifiability in multi-attribute reverse auction , 2011, ArXiv.

[20]  Andreas Jakoby,et al.  A Cryptographically t-Private Auction System , 2009, 2009 Third International Conference on Network and System Security.

[21]  Can C. Özturan,et al.  Multi-unit differential auction-barter model for electronic marketplaces , 2011, Electron. Commer. Res. Appl..

[22]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[23]  Wei Wei,et al.  An Improved Efficient Electronic Marketplace Bidding Auction Protocol with Bid Privacy , 2011 .

[24]  Binshan Lin,et al.  MoRVAM: A reverse Vickrey auction system for mobile commerce , 2007, Expert Syst. Appl..