The Design and Implementation of a Secure Auction Service
IEEE Transactions on Software Engineering
Adding timestamps to the secure electronic auction protocol
Data & Knowledge Engineering
An Online Public Auction Protocol Protecting Bidder Privacy
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
A Practical English Auction with One-Time Registration
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Efficient Sealed-Bid Auction Using Hash Chain
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Threshold Ring Signatures and Applications to Ad-hoc Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
1-out-of-n Signatures from a Variety of Keys
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Auction Protocol Which Hides Bids of Losers
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
How to obtain full privacy in auctions
International Journal of Information Security
Bidder-anonymous English auction scheme with privacy and public verifiability
Journal of Systems and Software
A secure e-auction scheme based on group signatures
Information Systems Frontiers
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A two-server, sealed-bid auction protocol
FC'02 Proceedings of the 6th international conference on Financial cryptography
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Efficient privacy-preserving protocols for multi-unit auctions
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Hi-index | 12.05 |
Privacy has become a factor of increasing importance in auction design. This paper introduces an efficient and spontaneous privacy-preserving English auction protocol based on revocable ring signature. The proposed protocol has three appealing characteristic: first, it offers conditional privacy-preservation: while the auctioneer can verify that a bidder is an authorized participant in the system only the collaboration of auctioneer and registration manager can reveal the true identity of a malicious bidder. Second, it is one-time registration: the bidder can take part in plural auctions in one time registration. Third, it is spontaneous: the bidder can bid without interaction with the auctioneer and other bidders. Finally, it is efficient: it saves the communication round complexity comparing with previously proposed solutions.