The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
On blind signatures and perfect crimes
Computers and Security
The Design and Implementation of a Secure Auction Service
IEEE Transactions on Software Engineering
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Adding timestamps to the secure electronic auction protocol
Data & Knowledge Engineering
Cryptographic Protocols for Auctions and Bargaining
Proceedings of the Colloquium in Honor of Arto Salomaa on Results and Trends in Theoretical Computer Science
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Provably Secure Fair Blind Signatures with Tight Revocation
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Auction Protocol Which Hides Bids of Losers
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Design and Verification of a Secure Electronic Auction Protocol
SRDS '98 Proceedings of the The 17th IEEE Symposium on Reliable Distributed Systems
A practical scheme for non-interactive verifiable secret sharing
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
A threshold cryptosystem without a trusted party
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Secure distributed key generation for discrete-log based cryptosystems
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Anonymous channel and authentication in wireless communications
Computer Communications
Bidder-anonymous English auction scheme with privacy and public verifiability
Journal of Systems and Software
Practical electronic auction scheme with strong anonymity and bidding privacy
Information Sciences: an International Journal
Comment on Lee et al.'s group signature and e-auction scheme
Information Systems Frontiers
Hi-index | 0.98 |
In this paper, we propose a secure and fair sealed-bid auction scheme. It uses a threshold cryptosystem without the assistance of a mutually entrusted party to guarantee fairness among bidders. In this scheme, the computations among bidders are independent and they only have to send an anonymous message to the clerk after the registration phase. Besides, we use modern cryptographic techniques like fair blind signatures and untraceable e-mail systems to design a real, fair, and secure sealed-bid auction scheme.