Skip to main content

Coercion Resistant MIX for Electronic Auction

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7671)

Abstract

Coercion in sealed-bid auction refers to the problem of bid-rigging, where the adversary (coercer) dictates the bidder (coerced bidder) to bid some low value and also feasible to determine whether the victim has complied with the demands. Therefore uncoerciveness is an essential property to achieve fair and competitive sealed-bid auction. Receipt-free mechanisms are developed to confine the property of uncoerciveness. The prior receipt-free schemes assume an impractical assumption of the availability of an untappable channel between bidders and the auction authorities. Our previous work proposed a sender-side deniable encryption scheme to relax the assumption of the untappable channel where the receiver side is not colluded. However, we examined that neither the untappable channel nor the deniable encryption can provide receipt-freeness in presence of colluded authorities unless the privacy of the bidders are not preserved. MIX (MIX-cascade) is a well known technique for anonymous communication. This paper presents a MIX scheme compatible with deniable encryption to facilitate the receipt-freeness mechanisms to be practical without the assumption of untappable channel and also in the presence of colluded authorities. The proposed MIX may replace the untappable channel without changing the existing receipt-free mechanisms.

Keywords

  • Uncoercibility
  • Deniable Encryption
  • Receipt-freeness
  • Privacy

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. O’Neill, A., Peikert, C., Waters, B.: Bi-Deniable Public-Key Encryption. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 525–542. Springer, Heidelberg (2011)

    Google Scholar 

  2. Pfitzmann, A., Köhntopp, M.: Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  3. Pfitzmann, B.: Breaking an Efficient Anonymous Channel. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 332–340. Springer, Heidelberg (1995)

    CrossRef  Google Scholar 

  4. Pfitzmann, B., Pfitzmann, A.: How to Break the Direct RSA-Implementation of MIXes. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 373–381. Springer, Heidelberg (1990)

    Google Scholar 

  5. Benaloh, J.C., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: STOC, pp. 544–553 (1994)

    Google Scholar 

  6. Gao, C., Yao, Z., Xie, D., Wei, B.: Electronic Sealed-Bid Auctions with Incoercibility. In: Wan, X. (ed.) Electrical Power Systems and Computers. LNEE, vol. 99, pp. 47–54. Springer, Heidelberg (2011)

    CrossRef  Google Scholar 

  7. Park, C., Itoh, K., Kurosawa, K.: Efficient Anonymous Channel and All/Nothing Election Scheme. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 248–259. Springer, Heidelberg (1994)

    Google Scholar 

  8. Ibrahim, M.H.: A method for obtaining deniable public-key encryption. IJNS 8, 159–165 (2009)

    Google Scholar 

  9. Zheng, H., Weidong, Q., Kefei, G.C.: Efficient receipt-free electronic auction protocol. In: SITIS, pp. 1023–1028 (2007)

    Google Scholar 

  10. Damgård, I., Nielsen, J.B.: Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 432–450. Springer, Heidelberg (2000)

    CrossRef  Google Scholar 

  11. Howlader, J., Ghosh, A., Pal, T.D.: Secure Receipt-Free Sealed-Bid Electronic Auction. In: Ranka, S., Aluru, S., Buyya, R., Chung, Y.-C., Dua, S., Grama, A., Gupta, S.K.S., Kumar, R., Phoha, V.V. (eds.) IC3 2009. CCIS, vol. 40, pp. 228–239. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  12. Howlader, J., Basu, S.: Sender-side public key deniable encryption scheme. In: ARTCom, pp. 9–13 (2009)

    Google Scholar 

  13. Sako, K., Kilian, J.: Receipt-Free Mix-Type Voting Scheme: A Practical Solution to the Implementation of a Voting Booth. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995)

    Google Scholar 

  14. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)

    CrossRef  Google Scholar 

  15. Abe, M.: Universally Verifiable Mix-Net with Verification Work Independent of the Number of Mix-Servers. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 437–447. Springer, Heidelberg (1998)

    CrossRef  Google Scholar 

  16. Abe, M., Suzuki, K.: Receipt-Free Sealed-Bid Auction. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 191–199. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  17. Dürmuth, M., Freeman, D.M.: Deniable Encryption with Negligible Detection Probability: An Interactive Construction. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 610–626. Springer, Heidelberg (2011)

    CrossRef  Google Scholar 

  18. Jakobsson, M.: A Practical Mix. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 448–461. Springer, Heidelberg (1998)

    CrossRef  Google Scholar 

  19. Jakobsson, M.: Flash mixing. In: PODC, pp. 83–89 (1999)

    Google Scholar 

  20. Jakobsson, M., Juels, A.: An optimally robust hybrid mix network. In: PODC, pp. 284–292 (2001)

    Google Scholar 

  21. Klonowski, M., Kubiak, P., Kutyłowski, M.: Practical Deniable Encryption. In: Geffert, V., Karhumäki, J., Bertoni, A., Preneel, B., Návrat, P., Bieliková, M. (eds.) SOFSEM 2008. LNCS, vol. 4910, pp. 599–609. Springer, Heidelberg (2008)

    CrossRef  Google Scholar 

  22. Berthold, O., Pfitzmann, A., Standtke, R.: The Disadvantages of Free MIX Routes and How to Overcome Them. In: Federrath, H. (ed.) Anonymity 2000. LNCS, vol. 2009, pp. 30–45. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  23. Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  24. Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable Encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90–104. Springer, Heidelberg (1997)

    Google Scholar 

  25. Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: STOC, pp. 639–648 (1996)

    Google Scholar 

  26. Chen, X., Lee, B., Kim, K.: Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 259–273. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  27. Desmedt, Y., Kurosawa, K.: How to Break a Practical MIX and Design a New One. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 557–572. Springer, Heidelberg (2000)

    CrossRef  Google Scholar 

  28. Her, Y.-S., Imamoto, K., Sakurai, K.: Receipt-free sealed-bid auction based on mix-net and pseudo id. In: Computer Security Symposium, pp. 2004–2010 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Howlader, J., Kar, J., Mal, A.K. (2012). Coercion Resistant MIX for Electronic Auction. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35130-3_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35129-7

  • Online ISBN: 978-3-642-35130-3

  • eBook Packages: Computer ScienceComputer Science (R0)