Batch verification of validity of bids in homomorphic e-auction

  • Authors:
  • Kun Peng;Colin Boyd;Ed Dawson

  • Affiliations:
  • Level 7, 126 Margaret St, Brisbane QLD4000, Information Security Institute, Queensland University of Technology, Australia;Level 7, 126 Margaret St, Brisbane QLD4000, Information Security Institute, Queensland University of Technology, Australia;Level 7, 126 Margaret St, Brisbane QLD4000, Information Security Institute, Queensland University of Technology, Australia

  • Venue:
  • Computer Communications
  • Year:
  • 2006

Quantified Score

Hi-index 0.24

Visualization

Abstract

Bid opening in e-auction is efficient when a homomorphic secret sharing function is employed to seal the bids and homomorphic secret reconstruction is employed to open the bids. However, this high efficiency is based on an assumption: the bids are valid (e.g., within a special range). An undetected invalid bid can compromise correctness and fairness of the auction. Unfortunately, validity verification of the bids is ignored in the auction schemes employing homomorphic secret sharing (called homomorphic auction in this paper). In this paper, an attack against the homomorphic auction in the absence of bid validity check is presented and a necessary bid validity check mechanism is proposed. Then a batch cryptographic technique is introduced and applied to improve the efficiency of bid validity check.