The Design and Implementation of a Secure Auction Service
IEEE Transactions on Software Engineering
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Playing Lottery on the Internet
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Negotiation-Credit Driven Coalition Formation in E-Markets
PRIMA 2001 Proceedings of the 4th Pacific Rim International Workshop on Multi-Agents, Intelligent Agents: Specification, Modeling, and Applications
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
1-out-of-n Signatures from a Variety of Keys
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Electronic Lottery Tickets as Micropayments
FC '97 Proceedings of the First International Conference on Financial Cryptography
Publicly Verifiable Lotteries: Applications of Delaying Functions
FC '98 Proceedings of the Second International Conference on Financial Cryptography
M+1-st Price Auction Using Homomorphic Encryption
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
VarietyCash: a multi-purpose electronic payment system
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Electronic auctions with private bids
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Design, implementation, and deployment of the iKP secure electronic payment system
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
We show a novel application of cryptography and implement the first sealed bargain scheme. Beginning with the conventional bargain, we define a sealed bargain model. Compared with the conventional bargain, the sealed one enjoys more convenience without loss of its economic properties. Finally, a concrete and simplified sealed bargain scheme is proposed with protection of privacy of both the seller and the costumer. The scheme follows the buy-and-leave principle, and one round of communication are sufficient. Pre-calculations can also be performed to improve practicality.