Abstract
In a typical organization multiple authorities may participate in purchasing process. Online implementation of such system should properly distribute security control over multiple-authorities to ensure trust among them and avoid dispute. In our research we are presenting two aspects of e-sealed bid auction in a two server setting using public key infrastructure: First, secure bid submission and bid opening using multiple authorities, and second, secure bid document storage for future references.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Boyd, C., Mao, W.: Security issues for electronic auctions. Hewlett-Packard Laboratories, HPL-2000-90 (2000)
Brandt, F.: How to obtain full privacy in auctions. International Journal of Information Security 5(4), 201–216 (2006)
Chase, M.: Multi-Authority Attribute Based Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007)
Chase, M., Chow, S.M.: Anonymous key issuing for Authority Attribute Based Encryption, US Patent,12(355),862 (2007)
Girouard, J., M., Ratliff, E., J., Simon, K.D.:System and method for intrusion decision-making in autonomic computing environment, US Patent, US 2005 0278178 A1(2005)
Islam, M.S., Dey, S., Kundu, G., Hoque, A.S.M.: A solution to the security issue of an e-government procurement system. In: International Conference on Electrical and Computer Engineering, pp. 659–664 (2008)
Juels, A., Szydlo, M.: A Two-Server, Sealed-Bid Auction Protocol. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 72–86. Springer, Heidelberg (2003)
Henecka, W., Schneider, T.: Two-Party Computation with Less Memory. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 437–446 (2013)
Hinkelmann, M., Jakoby, A., Stechert, P.: t-Ptivate t-Secure auction. Journal of Computer Science and Technology 23(5), 694–710 (2011)
Li, M., Juan, J., Tsai, J.S.T., Practical, J.H.C.: electronic auction scheme with strong anonymity. Information Science 181, 2576 (2011)
Liao, T., Wang, S., Tserng, M.T., Framework, H.P.A.: of electronic tendering for government procurement: a lesson learned in Taiwan. Automation in Construction 11, 731–742 (2002)
Lv, X., Li, H.S., Wang, B.: Group key agreement for secure group communication in dynamic peer systems. Journal of Parallel and Distributed Computing 72(10) (2012)
Naor, M., Pinkas, B., Summer, R.: Privacy preserving auctions and mechanism design. In: ACM Conference on Electronic Commerce, vol. 1, pp. 129–139 (1999)
Naseri, M.: Secure quantum sealed-bid auction. Optics Communications 282, 1939–1943 (2009)
Olive, J.: Secure Document Management system, US patent, US 2008 0235175 A1 (2008)
Public Procurement Bill: Planning Commission, Government of India (2012)
Pei, S., Chen, D., Chu, Y., Xu, Q., Xi, S.: Research of web service security model based on SOAP information. Information Technology Journal 11(2), 241–247 (2012)
Richhariya, P., Singh, P.K.: A Survey on Financial Fraud Detection Methodologies. International Journal of Computer Applications, 45–22 (2012)
Seveda, R.: Document Security Management system, EP patent, EP 1 894866 B1 (2011)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Shih, D.H., Yen, D.C., Cheng, C.H., Shih, M.H.: A secure multi-item e-auction mechanism with bid privacy. Computer & Security, 273–287 (2011)
Viswanathan, K., Boyd, C., Dawson, E.: A Three Phased Schema for Sealed Bid Auction System Design. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 412–426. Springer, Heidelberg (2000)
William, B.C., Elaine, B.: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, NIST Special Publication, 800-67 (2012)
Xiong, H., Chen, Z., Li, F.: Bidder-anonymous English auction protocol based on revocable ring signature. Expert Systems with Applications, 7062–7066 (2013)
Xiong, H., Yuen, T.H., Zhang, C., He, Y.-J., Yiu, S.M.: Attribute specified identity-based encryption. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol. 7863, pp. 60–74. Springer, Heidelberg (2013)
Yang, Y.G., Naseri, M., Wen, Q.Y.: Improved secure quantum sealed-bid auction. Optics Communications 282(20), 4167–4170 (2009)
Yao, A.C.: Protocols for secure computations. In: FOCS 1982, pp. 160–164. IEEE Computer Society (1982)
Zhou, L., Varadharajan, V., Hitchens, M.: Enforcing Role-Based Access Control for Secure Data Storage in the Cloud. The Computer Journal 54(10), 1675–1687 (2011)
Kudo, M.: Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals E81-A(1), 20–27 (1998)
Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1–20. Springer, Heidelberg (2009)
Sako, K.: An auction protocol which hides bids of losers. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 422–432. Springer, Heidelberg (2000)
Franklin, K.M., Reiter, K.M.: The design and implementation of a secure auction service. IEEE Transaction on Software Engineering 22(5), 302–312 (1996)
Du, T.C.: Building an Automatic e-Tendering System on the Semantic Web. Decision Support Systems 14(1), 13–21 (2009)
Benatallah, B., Casati, F., Toumani, F.: Web Service Conversation Modeling: Cornerstone for e-Business Automation. IEEE Internet Computing 7(6) (2003)
Du, R., Foo, E., Boyd, C., Fitzgerald, B.: Defining security services for electronic tendering. In: The Australasian Information Security Workshop (AISW 2004), vol. 32, pp. 43–52. Australian Computer Society Inc. and ACM (2004)
Zhao, Z., Naseri, M., Zheng, Y.: Secure quantum sealed-bid auction with post confirmation. Opt. Commun. 283(16), 3194–3197 (2010)
Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175–179 (December 1984)
Beaver, D., Micali, S., Rogaway, P.: The round plexity of secure protocols. ACM Synopsis on Theory of Computing, 503–513 (1990)
Kabisch, S., Peintner, D., Heuer, J.: XML-based Web service generation for microcontroller-based sensor actor networks. In: 2010 8th IEEE International Workshop on Factory Communication Systems (WFCS), pp. 181–184 (2010)
Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption, pp. 280–300. Springer, Heidelberg (2001)
Panayiotou, N.A., Sotiris, P.G., Ilias, P.T.: An e-procurement system for governmental purchasing. International Journal of Production Economics 90(1), 79–102 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sinha, S., Jenamani, M. (2014). A Security Framework for Multi-authority Based e-Sealed Bid Auction System. In: MartÃnez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-54525-2_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54524-5
Online ISBN: 978-3-642-54525-2
eBook Packages: Computer ScienceComputer Science (R0)