Font Size: a A A

The Construction Of A Sealed Electronic Auction Scheme

Posted on:2019-08-17Degree:MasterType:Thesis
Country:ChinaCandidate:S ZhangFull Text:PDF
GTID:2428330566978717Subject:Computational Mathematics
Abstract/Summary:PDF Full Text Request
In real life,auction is a common way of selling goods to the highest bidder.But,the real auctions have brought many inconvenience,such as time,place,number and so on.With the rapid development of the Internet,people craving for auction activities can be done online,so as to avoid the drawbacks of real auctions,making auction activities flexible,convenient and fast.The earliest auction website was founded by Ermida in 1995in order to provide people with variants of the Ebola virus code.Later,he devoted himself to online auctions,and then had the birth of eBay,the boss of online auctions.Nowadays,electronic auction has become a kind of goods trading and trading mechanism in the electronic business world.However,how to ensure the fairness,openness and security of the online auction after the electronic auction has overcome the shortcomings of the reality?This is a common concern for experts and scholars in the field of e-commerce and information security.That's what we need to discuss after constructing a sealed electronic auction scheme.There are many ways to construct electronic auction schemes,such as zero knowledge proof theory,secret sharing and verifiable secret sharing protocol,Bit commitment and Hash functions.However,the key used in decryption bidding of these schemes is always in the hands of the auction center,which makes the auctioneers passive.Moreover,in order to achieve tightness and timeliness,we need to assume that the auction center is trustworthy.This hypothesis may be wrong in operation.For example,a malicious bidder can buy the auction center to achieve his malicious purpose but nobody can know it.Is it possible to construct a sealed electronic auction scheme,which is controlled by the registries,auctioneers and auctioneers,who can be generated the key of decryption bidding together?Can this scheme meet the basic requirements of a sealed electronic auction scheme?This is the two major problem that this article focuses on.In this paper,a certificateless public key encryption scheme is combined with an undeniable signature scheme skillfully.A kind of time restricted plaintext non certificate public key cryptosystem is constructed,and it is applied to the sealed electronic auction scbmceuehnterttbeohigd ei bdet tetmsrhsseetir r,me yite,tmu s h lopnaraahkeene teo bydari tlo cnonoauaos en romgifccn t sfefitero hrocihwene r hqXp ptsc eaatasbotsluaeeiaurnlce iiesnvtetemid ro eoeglw,en nalviiae ntetn c nhtdscde td h ifrn toothrentfetfhihere reeri t e rboenichib seai ntdM i ducedl s is pncnreeoicloteenirc n cbotstr.nroro neaieai olsAlnceishcderdiaeodhdse e.etr at ahmbeuosId n wuye oc odnfbitts iihirdf odcetrfeiBndodo yerm r e aeetbtnsrhsc.nhsrt h eraeeuloteI u snt cpmsc opte eaerotonrh dgaehidrn.ta i rrea veeiaro umtsTesl c eh,o,t,t sioc iaaoosft w sln lelrmstoce oh ocawenlnh eikec engs rmyceet tohae ersfgo ki oatbchinudenmsetoymrts da,sreo t dr eteitnc ohlenyeohriness,cheating,it will inevitably be found and the auction will be terminated.Therefore,bidders do not need to worry about fairness,openness and safety of online auction activities when they enjoy the convenience and speed brought by the Internet.
Keywords/Search Tags:Sealed, Electronic Commerce, Auction, Undeniable Signature
PDF Full Text Request
Related items