Font Size: a A A

Design And Research Of Electronic Auction System Based On Secure Multi-party Computing

Posted on:2022-01-04Degree:MasterType:Thesis
Country:ChinaCandidate:Z T MinFull Text:PDF
GTID:2518306338460424Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet,electronic auctions have also ushered in great development,but at the same time it has also brought about data security,fairness and other issues.Therefore,research on electronic auctions based on secure multi-party computing is very necessary.This article mainly studies the design and implementation of an electronic auction system under secure multi-party computing.The goal is to enable users to obtain the winner and transaction price without revealing their true bids.Through the research of existing secure electronic auctions,and then based on my own understanding of secure electronic auctions,the e-auction scheme in this article is derived,that is,a one-round,highest-priced,sealed,secure electronic auction scheme.The electronic auction scheme in this article basically meets the requirements of secure electronic auctions in the design process,that is,the correctness of the transaction price,the confidentiality of the bid,the anonymity of the user,the non-repudiation of the bid,and the verifiability of the transaction price.The data exchange in the system in this paper is carried out in a secure channel,and all auction participant models are semi-honest models.The main work of this paper is as follows:1.The homomorphism of the asymmetric encryption algorithm is the theoretical basis for realizing secure multi-party computing.On this basis,the author of this article designs the user bidding price into a vector representation and encrypts the bidding vector.The multiplicative homomorphism of the ElGamal encryption algorithm is used for decryption,so that the transaction price and the successful bidder can be obtained without exposing the bids of all users.2.The ElGamal digital signature algorithm is used in the system to allow users to sign their bids to prevent bidding participants from denying,thereby solving the requirements of non-repudiation of bids and verifiable transaction prices.3.Analyze and study the Shamir secret sharing scheme,split the system encryption private key and save it in the hands of all bidding participants,so that all bidding participants are in a fair position.4.The SSM framework of JavaEE was used to design and implement the secure electronic auction system,and the system code security test was carried out.
Keywords/Search Tags:secure multi-party computing, ElGamal encryption algorithm, digital signature technology, secret sharing
PDF Full Text Request
Related items