Browse > Article
http://dx.doi.org/10.3837/tiis.2016.12.025

Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity  

Lee, Jung-San (Department of Information Engineering and Computer Science, Feng Chia University)
Wei, Kuo-Jui (Department of Information Engineering and Computer Science, Feng Chia University)
Chen, Ying-Chin (Department of Information Engineering and Computer Science, Feng Chia University)
Sun, Yun-Hsiang (Department of Information Engineering and Computer Science, Feng Chia University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.12, 2016 , pp. 5616-5642 More about this Journal
Abstract
Different from traditional auctions, electronic auctions provide a platform to allow bidders and auctioneers merchandise to each other over network anytime and anywhere. Auctioneers can publish information of goods, and bidders can choose the interested targets through this bidding platform. To ensure the fairness and security of electronic auctions, Li et al. have proposed a practical electronic auction scheme which can confirm the requirement of strong anonymity, bidding privacy, and secret bidding price. However, we have found out that Li et al.'s scheme may lurk the risk of the denial-of-service attack during the bidding phase in a sealed-bid auction. Thus, we propose a brand-new sealed-bid auction mechanism, in which the essentials of e-auction can be firmly preserved. In particular, each bidder only needs to register at the center once and then can join to multiple plays launched by different auctioneers. Moreover, the correctness of mutual authentication is confirmed according to the BAN logic model.
Keywords
Electronic auction; sealed-bid auction; dynamic identity; BAN logic; anonymity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. I. de Castro and D. H. Karney, "Equilibria Existence and Characterization in Auctions: Achievements and Open Questions," Journal of Economic Surveys, Vol. 26, No. 5, pp. 911-932, 2012.   DOI
2 C.C. Lina, S.C. Chenb and Y.M. Chu, "Automatic Price Negotiation on The Web: An Agentbased Web Application using Fuzzy Expert System," Expert Systems with Applications, Vol. 38, No. 5, pp. 5090-5100, 2011.   DOI
3 A. H. Ozer and C. Ozturan, "Multi-unit Differential Auction-barter Model for Electronic Marketplaces," Electronic Commerce Research and Applications, Vol. 10, pp. 132-143, 2011.   DOI
4 J.S. Chang and W.H. Chang, "Analysis of Fraudulent Behavior Strategies in Online Auctions for Detecting Latent Fraudsters," Electronic Commerce Research and Applications, Vol.13, No. 2, pp. 79-97, 2015.   DOI
5 F.S. Hsieh and C.S. Liao, "Schemes to Reward Winners in Combinational Double Auctions based on Optimization of Surplus," Electronic Commerce Research and Applications, Vol.14, No. 6, pp. 405-417, 2015.   DOI
6 C. Dang, Q. Hu and J. Liu, "Bidding Strategies in Online Auctions with Different Ending Rules and Value," Electronic Commerce Research and Applications, Vol.14, No. 2, pp. 104-111, 2015.   DOI
7 X. Li, J. Mab, W. Wang, Y. Xiong and J. Zhang, "A Novel Smart Card and Dynamic ID based Remote User Authentication Scheme for Multi-server Environments," Mathematical and Computer Modelling, Vol. 58, No. 1-2, pp. 85-95, 2012.   DOI
8 D. Chaum and H. Antwerpen, "Undeniable Signatures," Advances in Cryptology. CRYPTO'89, Vol. 435, pp. 212-216, 1990.
9 C.P. Schnorr, "Efficient Signature Generation for Smart Cards," Journal of Cryptology, Vol. 4, No. 3, pp. 239-252, 1991.
10 J. Daemen and V. Rijmen, "The Design of Rijndael: AES - The Advanced Encryption Standard," Springer, 2002.
11 S.P. Yang and X. Li, "Defect in Protocol Analysis with BAN Logic on Man-in-the-middle Attacks," Application Research of Computers, Vol. 24, pp. 149-151, 2007.
12 A. Menezes, P. V. Oorschot and S. Vanstone, "Handbook of Applied Cryptography," CRC Press, USA, pp. 321-376, 1996.
13 M. Burrows, M. Abadi and R. Needham, "Authentication: A Practical Study in Belief and Action," in Proc. of 2nd Conference on Theoretical Aspects of Reasoning about Knowledge, CA, USA, pp. 325-342, 1988.
14 M. Burrows, M. Abadi and R. Needham, "A Logic of Authentication," ACM Transactions on Computer Systems, Vol. 8, No. 1, pp. 18-36, 1990.   DOI
15 B. Schneier, "Applied Cryptography, Protocols Algorithms, and Source Code in C," John Wiley and Sons Inc., New York, U.S.A., 1994.
16 D. Hirakiuchi and K. Sakurait, "English vs. Sealed Bid in Anonymous Electronic Auction Protocols," in Proc. of IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 171-176, 2001.
17 C.C. Chang and Y.F. Chang, "Efficient Anonymous Auction Protocols with Freewheeling Bids," Computers & Security, Vol. 22, No. 8, pp. 728-734, 2003.   DOI
18 R. Jiang, L. Pan and J. H. Li, "An Improvement on Efficient Anonymous Auction Protocols," Computers & Security, Vol. 24, No. 2, pp. 169-174, 2005.   DOI
19 Y.F. Chang and C.C. Chang, "Enhanced Anonymous Auction Protocols with Freewheeling Bids," in Proc. of 20th International Conference on Advanced Information Networking and Application, Vol. 1, pp. 353-358, 2006.
20 H.T. Liaw, W.S. Juang and C.K. Lin, "An Electronic Online Bidding Auction Protocol with both Security and Efficiency," Applied Mathematics and Computation, Vol. 174, No. 2, pp. 1487- 1497, 2006.   DOI
21 Y.F. Chung, K.H. Huang, H.H. Lee, F.P. Lai and T.S. Chen, "Bidder-anonymous English Auction Scheme with Privacy and Public Verifiability," Journal of Systems and Software, Vol. 81, No. 1, pp. 113-119, 2008.   DOI
22 W. Standaert, S. Muylle and I. Amelinckx, "An Empirical Study of Electronic Reverse Auction Project Outcomes," Electronic Commerce Research and Applications, Vol.14, No. 2, pp. 81-94, 2015.   DOI
23 Y.F. Chung, Y.T. Chen, T.L. Chen and T.S. Chen, "An Agent-based English Auction Protocol using Elliptic Curve Cryptosystem for Mobile Commerce," Expert Systems with Applications, Vol. 38, No. 8, pp. 9900-9907, 2011.   DOI
24 H. Xiong, Z. Chen and F. Li, "Bidder-anonymous English Auction Protocol based on Revocable Ring Signature," Expert Systems with Applications, Vol. 39, No. 8, pp. 7062-7066, 2012.   DOI
25 J.Heezen and W. Beats, "The Impact of Electronic Markets: The Case of the Dutch Flower Auction," Journal of Strategic Information System, Vol. 5, No. 4, pp. 317-333, 1996.   DOI
26 C.C. Wu, C.C. Chang and I.C. Lin, "New Sealed-bid Electronic Auction with Fairness, Security and Efficiency," Journal of Computer Science and Technology, Vol. 23, No. 2, pp. 253-264, 2008.   DOI
27 M.J. Li, J. S.T. Juan and J. H.C. Tsai, "Practical Electronic Auction Scheme with Strong Anonymity and Bidding Privacy," Information Sciences, Vol. 181, No. 12, pp. 2576-2586, 2011.   DOI
28 W. Shi, "An Efficient Sealed-bid Auction Protocol with Bid Privacy and Bidder Privacy," International Journal of Innovative Computing, Information and Control, Vol. 8, No. 11, pp. 7943- 7953, 2012.
29 W.S. Juang, H.T. Liaw, P.C. Lin and C.K. Lin, "The Design of a Secure and Fair Sealed-bid Auction Service," Mathematical and Computer Modelling, Vol. 41, No. 8-9, pp. 973-985, 2005.   DOI
30 K. Miyashita, "Online Double Auction Mechanism for Perishable Goods," Electronic Commerce Research and Applications, Vol.13, No. 5, pp. 355-367, 2015.   DOI