Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Qiongzhou University》 2015-02
Add to Favorite Get Latest Update

A Secure E-bidding Scheme Based on Group Signature

CHEN Kai-bing;Department of Economy and Trade,Chuzhou Vocational and Technical College;  
E-bidding has become inevitable trend. This paper presents a new bidding scheme. The scheme is based on bilinear pairings and the vector space secret sharing technology. The results show that the scheme is safe and effective. That is suitable for distributed large-scale E-bidding.
【Fund】: 安徽省2014年省级质量工程项目(2014sxzx031);; 滁州职业技术学院规划课题2013年度重点研究项目(yjz-2013-04)
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 8 Hits
1 ZHANG Guo-jun1 ZHANG Jian-feng2(1.Changzhou College of Information Technology,Changzhou 213164 2.Changzhou Construction Project Bids and Entering Bids Office,Changzhou 213015,China);The Application of Electronic Signature Technology in Online Bidding System[J];Journal of Changzhou Vocational College of Information Technology;2011-04
2 ZHAO Zhi-hua1,ZHANG Yong-xin2(1.Department of Information Engineering,Shan Xi Water Conservancy Vocational College,Yuncheng 044000,China;2.School of Continuing Education,Luoyang Normal University,Luoyang 471022,China);Study on safety of internet bidding system[J];Journal of Daqing Normal University;2010-03
3 Li Bin,Ding Yong (School of Mathematics and Computational Science,Guilin University of Electronic Technology,Guilin 541004,China);An electronic auction scheme based on group signature[J];Journal of Guilin University of Electronic Technology;2011-02
4 TANG Li-wei,DU Wei-zhang(School of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha 410004,China);A dynamic group signature scheme based on bilinear pairing[J];Journal of Changsha University of Science & Technology(Natural Science);2012-01
5 ZHAO Shu-ping1,WANG Hua-qun1,21.School of Information Engineering,Dalian Fisheries University,Dalian,Liaoning 116023,China 2.Key Laboratory of Network Security and Cryptology,Fujian Normal University,Fuzhou 350007,China;Cryptanalysis and improvement of group signature scheme[J];Computer Engineering and Applications;2009-20
6 MA Chun-Bo~1) AO Jun~2) HE Da-Ke~3)~1)(School of Computer and Communications Engineering, Southwest Jiaotong University, Chengdu 610031)~2)(Laboratory for Radar Signal Processing, Xidian University, Xi′an 710071)~3)(Laboratory of Information Security and National Computing Grid, Southwest Jiaotong University, Chengdu 610031);Multi-Signature and Group Signature Based on Bilinear Pairing[J];Chinese Journal of Computers;2005-09
7 ZHAO Li-ping,TANG Wen-liang (School of Software Engineering East China Jiaotong University,Nanchang Jiangxi 330013,China);A Secure Electronic Auction Scheme Based on Group Signature[J];Computer Simulation;2010-05
8 GAO Tian-liang,XIA Qing-guo,WANG Xi(School of Computer Science,Northwestern Polytechnical University,Xi'an 710129,P.R.China);The Practical Analysis of a Project with Dynamic Group Signature[J];Science Technology and Engineering;2011-06
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Guo-jun1 ZHANG Jian-feng2(1.Changzhou College of Information Technology,Changzhou 213164 2.Changzhou Construction Project Bids and Entering Bids Office,Changzhou 213015,China);The Application of Electronic Signature Technology in Online Bidding System[J];Journal of Changzhou Vocational College of Information Technology;2011-04
2 WANG Lin-xia1,CHEN Ze-mei2(1.School of Computer and Technology,Nanhua University,Hengyang 421001,China;2.Huatian Engineering & Technology Corporation,MCC,Maanshan 243005,China;A Multi-level Proxy Blind Multi Signature Scheme Based on ECC[J];Computer Knowledge and Technology;2009-22
3 DU Shou-wei 1 , LI Guo-wen 2 , LI Da-xing 1 (1.Institute of Network Security, Shandong University, Jinan 250100,P.R.China; 2.College of Computer Science and Technology, Jianzhu University, Jinan 250101,P.R.China);Research on Group Signature Based on Vector Space Secret Sharing[J];Computer Security;2008-04
4 Yang Yong(Department of Law,Heze University);Research on the Progress in China of Electronic Signature in Aspects of Technology and Law[J];Electronic Technology;2012-05
5 Li Bin,Ding Yong (School of Mathematics and Computational Science,Guilin University of Electronic Technology,Guilin 541004,China);An electronic auction scheme based on group signature[J];Journal of Guilin University of Electronic Technology;2011-02
6 ZHANG Guo-jun;Changzhou College of Information Technology;;Security Management of Electronic Documents Based on the Bidding System of Network Construction Projects[J];Journal of Changzhou Vocational College of Information Technology;2013-06
7 TANG Li-wei,DU Wei-zhang(School of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha 410004,China);A dynamic group signature scheme based on bilinear pairing[J];Journal of Changsha University of Science & Technology(Natural Science);2012-01
8 WU Bin~1,DIN Jing~2(1.Library,Huaiyin Teachers College,Huaian Jiangsu,223300,China)(2.Department of Laboratory Equipment,Huaiyin Teachers College,Huaian Jiangsu,223300,China);The Undeniable Signature Scheme Based on Bilinear Pairing[J];Journal of Huaiyin Teachers College(Natural Science Edition);2006-04
9 ZHAO Shu-ping1,WANG Hua-qun1,21.School of Information Engineering,Dalian Fisheries University,Dalian,Liaoning 116023,China 2.Key Laboratory of Network Security and Cryptology,Fujian Normal University,Fuzhou 350007,China;Cryptanalysis and improvement of group signature scheme[J];Computer Engineering and Applications;2009-20
10 ZHAO Li-ping,TANG Wen-liang (School of Software Engineering East China Jiaotong University,Nanchang Jiangxi 330013,China);A Secure Electronic Auction Scheme Based on Group Signature[J];Computer Simulation;2010-05
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Guo-jun~① BAI Ju-he~②(~① Electronic and Electrical Engineering College,Changzhou College of Information Technology,Changzhou 213164~② Software Engineering Center Based,Tongji University,Shanghai 200331,China);Embedded Electronic Seal System Based on PKI[J];Journal of Changzhou Vocational College of Information Technology;2008-01
2 ZHAO Zhi-hua1,ZHANG Yong-xin2(1.Department of Information Engineering,Shan Xi Water Conservancy Vocational College,Yuncheng 044000,China;2.School of Continuing Education,Luoyang Normal University,Luoyang 471022,China);Study on safety of internet bidding system[J];Journal of Daqing Normal University;2010-03
3 JI Dong yao 1,2 ,WANG Yu min 2 (1 National Key Laboratory of Information Security Graduate School,Academia Sinica,Beijing 100039,China; 2 National Key Laboratory on ISN,Xidian University,XI'an,Shaanxi 710071,China);A Distributed Secure Electronic Auction Protocol Based on Group Signatures[J];Acta Electronica Sinica;2002-01
4 WANG Ji-lin 1,2,ZHANG Jian-hong 2,WANG Yu-min 2 (1.Zhejiang University of Finance and Economics,Zhejiang,Hangzhou 310012,China; 2.National Key Lab of ISN,Xidian University,Xi'an,Shaanxi 710071,China);A Group Signature Scheme Based on Ring Signature Idea[J];Acta Electronica Sinica;2004-03
5 MA Chun bo,HE Da ke 1 School of Computer and Communications Engineering,Southwest Jiaotong University,Chengdu,Sichuan 610031,China; 2 Lab.of Information Security and National Computing Grid,Southwest Jiaotong University,Chengdu,Sichuan 610031,China);Vector Space Secret Sharing Group Signature Scheme[J];Acta Electronica Sinica;2005-02
6 Li Yan-jun① Wu Yu-hua① Li Meng-dong① Yang Gang② ①(Department of Electronic Information Engineering, Beijing Electronic Science and Technology Institute,Beijing 100070, China) ②(School of Science, Beijing Institute of Technology, Beijing 100081, China);Forgery Attack to a Group Signature Scheme[J];Journal of Electronics & Information Technology;2007-07
7 YANG Lei-xin,DU Wei-zhang(School of Computer and Communication Engineering,Changsha Universityof Science and Technology,Changsha 410004,China);The improvement of Niederreiter public key cryptosystem by using dual public-key[J];Journal of Changsha University of Science & Technology(Natural Science);2010-04
8 Li Rupeng1,Yu Jia1,2,Li Guowen1,and Li Daxing11(Institute of Network Security,Shandong University,Jinan 250100)2(College of Information Engineering,Qingdao University,Qingdao 266071);Forward Secure Group Signature Schemes with Efficient Revocation[J];Journal of Computer Research and Development;2007-07
9 Dai Yuanjun Yang Cheng Ma Chunguang(Information Security Center,Beijing University of Posts and Telecommunications,Beijing100876)(Technological Office of Yinchuan City Commercial Bank,Yinchuan750001);A Secure English Auction Protocol with Signature Based on Proof of Knowledge[J];Computer Engineering and Applications;2004-27
10 ZHANG Xiao-min,ZHANG Jian-zhong (College of Mathematics and Information Science,Shaanxi Normal University,Xi'an 710062,China);Zero-Knowledge Proof Scheme of Identity Authentication Based on ElGamal Digital Signature[J];Computer Engineering and Applications;2006-34
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved