Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Acta Electronica Sinica》 2003-10
Add to Favorite Get Latest Update

A Secure Sealed-bid Electronic Auction Scheme

WANG Ji lin,CHEN Xiao feng,WANG Yu min (National Key Lab.of IS N,Xidian University,Xi'an,Shaanxi 710071,China)  
The protection of bidder privacy and the prevention of bidder default are the keys in the designing of Secure Electronic Auction Scheme.This paper gives a secure sealed bid auction scheme using only a one way function.Our scheme can satisfy all the secure requirements of sealed bid auction stated and has the advantages similar to the scheme of .
【Fund】: 国家自然科学基金资助课题 (No .60 0 730 52 )
【CateGory Index】: TP399
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 XIAO Zi-bi1, YANG Bo2, LI Shou-gui1 (1. School of Science, Wuhan University of Science and Technology, Wuhan 430081; 2. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876);Security Analysis and Improvement of Electronic Auction Based on Hash Chain[J];Computer Engineering;2009-08
Chinese Journal Full-text Database 10 Hits
1 ZHU Jian-dong,HUANG Gen-xun,ZHOU Ran,WEI Fu-shan (College of Science,Peoples Liberation Army Information Engineering University,Zhengzhou 450001,China);Electronical Auction Scheme with Oblivious Third Party[J];Journal of Jilin University(Information Science Edition);2006-03
2 TANG Liang-gui,YU Zhi-cheng(Chongqing Technology and Business University,Chongqing 400067, China);Research on the Tradeoff Model of E-Business Based on Internet Environment[J];;2002-06
3 Cheng Shaogang Zhao Shurong (Colleg of Applied Math. College of Human Arts and Science, UEST of China Chengdu 610054);Study on Bidding Decision Making of Two-Object Auction Based on Random Estimate[J];Journal of University of Electronic Science and Technology of China;2002-04
4 Lu Qing,Zhou Shijie,Fu Yan (School of Computer Science and Engineering, UEST of China Chengdu 610054);Analyzing Anonymous Communication Technology[J];Journal of University of Electronic Science and Technology of China;2004-02
5 YANG Jia-xi1,LI Lei1,2,WANG Yu-min1(1.National Key Lab.of Integrated Service Networks,Xidian University Xi’an 710071;2.School of Information Engineering,Zhengzhou University Zhengzhou 450052);Publicly Verifiable Secure Electronic Auction[J];Journal of University of Electronic Science and Technology of China;2008-01
6 ;Design and Implementation of the Retrose AuctionSystem vAuc Based on Internet[J];Computer Development & Applications;2001-01
7 Fu Xiaoming,Zhang Yaoxue,Ma Hongjun,Zhao Yanbiao (Dept.of Computer Science & Technology,Tsinghua University,Beijing 100084);A Market Based Approach to Allocate Bandwidth for Computer Networks[J];ACTA ELECTRONICA SINICA;1999-09
8 YANG Bo,LIU Sheng li,WANG Yu min (National Key Laboratory on ISN,Xidian University,Xi'an 710071,China);An Anonymity Revoking Electronic Payment System by Smart Card[J];ACTA ELECTRONICA SINICA;1999-10
9 ZHANG Fu-tai,WANG Yu-min(1.Po.Box 119,Key Lab.of ISN,Xidian University,Xi′an,Shanxi 710071,China; 2.School of Computer Since,Shanxi Normal University,Xian,Shanxi 710072,China);Construction of Secret Sharing Schemes on Access Structures with Transfer Property[J];Acta Electronica Sinica;2001-11
10 JI Dong yao 1,2 ,WANG Yu min 2 (1 National Key Laboratory of Information Security Graduate School,Academia Sinica,Beijing 100039,China; 2 National Key Laboratory on ISN,Xidian University,XI'an,Shaanxi 710071,China);A Distributed Secure Electronic Auction Protocol Based on Group Signatures[J];Acta Electronica Sinica;2002-01
【Secondary References】
Chinese Journal Full-text Database 2 Hits
1 CAI Qing-Hua,CHEN Wen-Li (Computer Science Department,Anqing Teacher Training College,Anqing 246001,China);An Unconditionally Anonymous Signcryption Algorithm Based on Elliptic Curves[J];Journal of Henan University of Science & Technology(Natural Science);2006-01
2 CAI Qing-hua(Computer Science Department,Anqing Teachers'College,Anqing 246001,China);A Signcryption Scheme with Forward Security Based on ECC[J];Computer Technology and Development;2007-12
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved