Skip to main content

A Security Framework for Multi-authority Based e-Sealed Bid Auction System

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 420))

  • 2511 Accesses

Abstract

In a typical organization multiple authorities may participate in purchasing process. Online implementation of such system should properly distribute security control over multiple-authorities to ensure trust among them and avoid dispute. In our research we are presenting two aspects of e-sealed bid auction in a two server setting using public key infrastructure: First, secure bid submission and bid opening using multiple authorities, and second, secure bid document storage for future references.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boyd, C., Mao, W.: Security issues for electronic auctions. Hewlett-Packard Laboratories, HPL-2000-90 (2000)

    Google Scholar 

  2. Brandt, F.: How to obtain full privacy in auctions. International Journal of Information Security 5(4), 201–216 (2006)

    Article  Google Scholar 

  3. Chase, M.: Multi-Authority Attribute Based Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  4. Chase, M., Chow, S.M.: Anonymous key issuing for Authority Attribute Based Encryption, US Patent,12(355),862 (2007)

    Google Scholar 

  5. Girouard, J., M., Ratliff, E., J., Simon, K.D.:System and method for intrusion decision-making in autonomic computing environment, US Patent, US 2005 0278178 A1(2005)

    Google Scholar 

  6. Islam, M.S., Dey, S., Kundu, G., Hoque, A.S.M.: A solution to the security issue of an e-government procurement system. In: International Conference on Electrical and Computer Engineering, pp. 659–664 (2008)

    Google Scholar 

  7. Juels, A., Szydlo, M.: A Two-Server, Sealed-Bid Auction Protocol. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 72–86. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Henecka, W., Schneider, T.: Two-Party Computation with Less Memory. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 437–446 (2013)

    Google Scholar 

  9. Hinkelmann, M., Jakoby, A., Stechert, P.: t-Ptivate t-Secure auction. Journal of Computer Science and Technology 23(5), 694–710 (2011)

    Article  MathSciNet  Google Scholar 

  10. Li, M., Juan, J., Tsai, J.S.T., Practical, J.H.C.: electronic auction scheme with strong anonymity. Information Science 181, 2576 (2011)

    Article  MATH  Google Scholar 

  11. Liao, T., Wang, S., Tserng, M.T., Framework, H.P.A.: of electronic tendering for government procurement: a lesson learned in Taiwan. Automation in Construction 11, 731–742 (2002)

    Article  Google Scholar 

  12. Lv, X., Li, H.S., Wang, B.: Group key agreement for secure group communication in dynamic peer systems. Journal of Parallel and Distributed Computing 72(10) (2012)

    Google Scholar 

  13. Naor, M., Pinkas, B., Summer, R.: Privacy preserving auctions and mechanism design. In: ACM Conference on Electronic Commerce, vol. 1, pp. 129–139 (1999)

    Google Scholar 

  14. Naseri, M.: Secure quantum sealed-bid auction. Optics Communications 282, 1939–1943 (2009)

    Article  Google Scholar 

  15. Olive, J.: Secure Document Management system, US patent, US 2008 0235175 A1 (2008)

    Google Scholar 

  16. Public Procurement Bill: Planning Commission, Government of India (2012)

    Google Scholar 

  17. Pei, S., Chen, D., Chu, Y., Xu, Q., Xi, S.: Research of web service security model based on SOAP information. Information Technology Journal 11(2), 241–247 (2012)

    Article  Google Scholar 

  18. Richhariya, P., Singh, P.K.: A Survey on Financial Fraud Detection Methodologies. International Journal of Computer Applications, 45–22 (2012)

    Google Scholar 

  19. Seveda, R.: Document Security Management system, EP patent, EP 1 894866 B1 (2011)

    Google Scholar 

  20. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  21. Shih, D.H., Yen, D.C., Cheng, C.H., Shih, M.H.: A secure multi-item e-auction mechanism with bid privacy. Computer & Security, 273–287 (2011)

    Google Scholar 

  22. Viswanathan, K., Boyd, C., Dawson, E.: A Three Phased Schema for Sealed Bid Auction System Design. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 412–426. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  23. William, B.C., Elaine, B.: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, NIST Special Publication, 800-67 (2012)

    Google Scholar 

  24. Xiong, H., Chen, Z., Li, F.: Bidder-anonymous English auction protocol based on revocable ring signature. Expert Systems with Applications, 7062–7066 (2013)

    Google Scholar 

  25. Xiong, H., Yuen, T.H., Zhang, C., He, Y.-J., Yiu, S.M.: Attribute specified identity-based encryption. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol. 7863, pp. 60–74. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  26. Yang, Y.G., Naseri, M., Wen, Q.Y.: Improved secure quantum sealed-bid auction. Optics Communications 282(20), 4167–4170 (2009)

    Article  Google Scholar 

  27. Yao, A.C.: Protocols for secure computations. In: FOCS 1982, pp. 160–164. IEEE Computer Society (1982)

    Google Scholar 

  28. Zhou, L., Varadharajan, V., Hitchens, M.: Enforcing Role-Based Access Control for Secure Data Storage in the Cloud. The Computer Journal 54(10), 1675–1687 (2011)

    Article  Google Scholar 

  29. Kudo, M.: Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals E81-A(1), 20–27 (1998)

    MathSciNet  Google Scholar 

  30. Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1–20. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  31. Sako, K.: An auction protocol which hides bids of losers. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 422–432. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  32. Franklin, K.M., Reiter, K.M.: The design and implementation of a secure auction service. IEEE Transaction on Software Engineering 22(5), 302–312 (1996)

    Article  Google Scholar 

  33. Du, T.C.: Building an Automatic e-Tendering System on the Semantic Web. Decision Support Systems 14(1), 13–21 (2009)

    Article  Google Scholar 

  34. Benatallah, B., Casati, F., Toumani, F.: Web Service Conversation Modeling: Cornerstone for e-Business Automation. IEEE Internet Computing 7(6) (2003)

    Google Scholar 

  35. Du, R., Foo, E., Boyd, C., Fitzgerald, B.: Defining security services for electronic tendering. In: The Australasian Information Security Workshop (AISW 2004), vol. 32, pp. 43–52. Australian Computer Society Inc. and ACM (2004)

    Google Scholar 

  36. Zhao, Z., Naseri, M., Zheng, Y.: Secure quantum sealed-bid auction with post confirmation. Opt. Commun. 283(16), 3194–3197 (2010)

    Article  Google Scholar 

  37. Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175–179 (December 1984)

    Google Scholar 

  38. Beaver, D., Micali, S., Rogaway, P.: The round plexity of secure protocols. ACM Synopsis on Theory of Computing, 503–513 (1990)

    Google Scholar 

  39. Kabisch, S., Peintner, D., Heuer, J.: XML-based Web service generation for microcontroller-based sensor actor networks. In: 2010 8th IEEE International Workshop on Factory Communication Systems (WFCS), pp. 181–184 (2010)

    Google Scholar 

  40. Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption, pp. 280–300. Springer, Heidelberg (2001)

    Google Scholar 

  41. Panayiotou, N.A., Sotiris, P.G., Ilias, P.T.: An e-procurement system for governmental purchasing. International Journal of Production Economics 90(1), 79–102 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sinha, S., Jenamani, M. (2014). A Security Framework for Multi-authority Based e-Sealed Bid Auction System. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54525-2_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54524-5

  • Online ISBN: 978-3-642-54525-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics