DOI QR코드

DOI QR Code

Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity

  • Lee, Jung-San (Department of Information Engineering and Computer Science, Feng Chia University) ;
  • Wei, Kuo-Jui (Department of Information Engineering and Computer Science, Feng Chia University) ;
  • Chen, Ying-Chin (Department of Information Engineering and Computer Science, Feng Chia University) ;
  • Sun, Yun-Hsiang (Department of Information Engineering and Computer Science, Feng Chia University)
  • Received : 2016.07.02
  • Accepted : 2016.10.12
  • Published : 2016.12.31

Abstract

Different from traditional auctions, electronic auctions provide a platform to allow bidders and auctioneers merchandise to each other over network anytime and anywhere. Auctioneers can publish information of goods, and bidders can choose the interested targets through this bidding platform. To ensure the fairness and security of electronic auctions, Li et al. have proposed a practical electronic auction scheme which can confirm the requirement of strong anonymity, bidding privacy, and secret bidding price. However, we have found out that Li et al.'s scheme may lurk the risk of the denial-of-service attack during the bidding phase in a sealed-bid auction. Thus, we propose a brand-new sealed-bid auction mechanism, in which the essentials of e-auction can be firmly preserved. In particular, each bidder only needs to register at the center once and then can join to multiple plays launched by different auctioneers. Moreover, the correctness of mutual authentication is confirmed according to the BAN logic model.

Keywords

References

  1. D. Hirakiuchi and K. Sakurait, "English vs. Sealed Bid in Anonymous Electronic Auction Protocols," in Proc. of IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 171-176, 2001.
  2. C.C. Chang and Y.F. Chang, "Efficient Anonymous Auction Protocols with Freewheeling Bids," Computers & Security, Vol. 22, No. 8, pp. 728-734, 2003. https://doi.org/10.1016/S0167-4048(03)00013-0
  3. R. Jiang, L. Pan and J. H. Li, "An Improvement on Efficient Anonymous Auction Protocols," Computers & Security, Vol. 24, No. 2, pp. 169-174, 2005. https://doi.org/10.1016/j.cose.2004.09.010
  4. Y.F. Chang and C.C. Chang, "Enhanced Anonymous Auction Protocols with Freewheeling Bids," in Proc. of 20th International Conference on Advanced Information Networking and Application, Vol. 1, pp. 353-358, 2006.
  5. H.T. Liaw, W.S. Juang and C.K. Lin, "An Electronic Online Bidding Auction Protocol with both Security and Efficiency," Applied Mathematics and Computation, Vol. 174, No. 2, pp. 1487- 1497, 2006. https://doi.org/10.1016/j.amc.2005.06.016
  6. Y.F. Chung, K.H. Huang, H.H. Lee, F.P. Lai and T.S. Chen, "Bidder-anonymous English Auction Scheme with Privacy and Public Verifiability," Journal of Systems and Software, Vol. 81, No. 1, pp. 113-119, 2008. https://doi.org/10.1016/j.jss.2007.03.029
  7. Y.F. Chung, Y.T. Chen, T.L. Chen and T.S. Chen, "An Agent-based English Auction Protocol using Elliptic Curve Cryptosystem for Mobile Commerce," Expert Systems with Applications, Vol. 38, No. 8, pp. 9900-9907, 2011. https://doi.org/10.1016/j.eswa.2011.02.039
  8. H. Xiong, Z. Chen and F. Li, "Bidder-anonymous English Auction Protocol based on Revocable Ring Signature," Expert Systems with Applications, Vol. 39, No. 8, pp. 7062-7066, 2012. https://doi.org/10.1016/j.eswa.2012.01.040
  9. J.Heezen and W. Beats, "The Impact of Electronic Markets: The Case of the Dutch Flower Auction," Journal of Strategic Information System, Vol. 5, No. 4, pp. 317-333, 1996. https://doi.org/10.1016/S0963-8687(96)80032-1
  10. W. Standaert, S. Muylle and I. Amelinckx, "An Empirical Study of Electronic Reverse Auction Project Outcomes," Electronic Commerce Research and Applications, Vol.14, No. 2, pp. 81-94, 2015. https://doi.org/10.1016/j.elerap.2014.12.001
  11. C.C. Wu, C.C. Chang and I.C. Lin, "New Sealed-bid Electronic Auction with Fairness, Security and Efficiency," Journal of Computer Science and Technology, Vol. 23, No. 2, pp. 253-264, 2008. https://doi.org/10.1007/s11390-008-9127-x
  12. M.J. Li, J. S.T. Juan and J. H.C. Tsai, "Practical Electronic Auction Scheme with Strong Anonymity and Bidding Privacy," Information Sciences, Vol. 181, No. 12, pp. 2576-2586, 2011. https://doi.org/10.1016/j.ins.2011.02.005
  13. W. Shi, "An Efficient Sealed-bid Auction Protocol with Bid Privacy and Bidder Privacy," International Journal of Innovative Computing, Information and Control, Vol. 8, No. 11, pp. 7943- 7953, 2012.
  14. W.S. Juang, H.T. Liaw, P.C. Lin and C.K. Lin, "The Design of a Secure and Fair Sealed-bid Auction Service," Mathematical and Computer Modelling, Vol. 41, No. 8-9, pp. 973-985, 2005. https://doi.org/10.1016/j.mcm.2004.05.008
  15. K. Miyashita, "Online Double Auction Mechanism for Perishable Goods," Electronic Commerce Research and Applications, Vol.13, No. 5, pp. 355-367, 2015. https://doi.org/10.1016/j.elerap.2014.06.004
  16. L. I. de Castro and D. H. Karney, "Equilibria Existence and Characterization in Auctions: Achievements and Open Questions," Journal of Economic Surveys, Vol. 26, No. 5, pp. 911-932, 2012. https://doi.org/10.1111/j.1467-6419.2011.00680.x
  17. C.C. Lina, S.C. Chenb and Y.M. Chu, "Automatic Price Negotiation on The Web: An Agentbased Web Application using Fuzzy Expert System," Expert Systems with Applications, Vol. 38, No. 5, pp. 5090-5100, 2011. https://doi.org/10.1016/j.eswa.2010.09.142
  18. A. H. Ozer and C. Ozturan, "Multi-unit Differential Auction-barter Model for Electronic Marketplaces," Electronic Commerce Research and Applications, Vol. 10, pp. 132-143, 2011. https://doi.org/10.1016/j.elerap.2010.03.002
  19. J.S. Chang and W.H. Chang, "Analysis of Fraudulent Behavior Strategies in Online Auctions for Detecting Latent Fraudsters," Electronic Commerce Research and Applications, Vol.13, No. 2, pp. 79-97, 2015. https://doi.org/10.1016/j.elerap.2013.10.004
  20. F.S. Hsieh and C.S. Liao, "Schemes to Reward Winners in Combinational Double Auctions based on Optimization of Surplus," Electronic Commerce Research and Applications, Vol.14, No. 6, pp. 405-417, 2015. https://doi.org/10.1016/j.elerap.2015.05.002
  21. C. Dang, Q. Hu and J. Liu, "Bidding Strategies in Online Auctions with Different Ending Rules and Value," Electronic Commerce Research and Applications, Vol.14, No. 2, pp. 104-111, 2015. https://doi.org/10.1016/j.elerap.2014.12.002
  22. X. Li, J. Mab, W. Wang, Y. Xiong and J. Zhang, "A Novel Smart Card and Dynamic ID based Remote User Authentication Scheme for Multi-server Environments," Mathematical and Computer Modelling, Vol. 58, No. 1-2, pp. 85-95, 2012. https://doi.org/10.1016/j.mcm.2012.06.033
  23. D. Chaum and H. Antwerpen, "Undeniable Signatures," Advances in Cryptology. CRYPTO'89, Vol. 435, pp. 212-216, 1990.
  24. C.P. Schnorr, "Efficient Signature Generation for Smart Cards," Journal of Cryptology, Vol. 4, No. 3, pp. 239-252, 1991.
  25. J. Daemen and V. Rijmen, "The Design of Rijndael: AES - The Advanced Encryption Standard," Springer, 2002.
  26. A. Menezes, P. V. Oorschot and S. Vanstone, "Handbook of Applied Cryptography," CRC Press, USA, pp. 321-376, 1996.
  27. M. Burrows, M. Abadi and R. Needham, "Authentication: A Practical Study in Belief and Action," in Proc. of 2nd Conference on Theoretical Aspects of Reasoning about Knowledge, CA, USA, pp. 325-342, 1988.
  28. M. Burrows, M. Abadi and R. Needham, "A Logic of Authentication," ACM Transactions on Computer Systems, Vol. 8, No. 1, pp. 18-36, 1990. https://doi.org/10.1145/77648.77649
  29. S.P. Yang and X. Li, "Defect in Protocol Analysis with BAN Logic on Man-in-the-middle Attacks," Application Research of Computers, Vol. 24, pp. 149-151, 2007.
  30. B. Schneier, "Applied Cryptography, Protocols Algorithms, and Source Code in C," John Wiley and Sons Inc., New York, U.S.A., 1994.