English  |  正體中文  |  简体中文  |  Items with full text/Total items : 65275/65275 (100%)
Visitors : 20910421      Online Users : 244
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/8751


    Title: 電子競標系統之研究;The Research on Electronic Auction Schemes
    Authors: 蕭勝文;Sheng-Wen Hsiao
    Contributors: 資訊工程研究所
    Keywords: 電子競標;智慧卡;無收據;electronic auction;sealed-bid;smart card;receipt-free
    Date: 2003-06-11
    Issue Date: 2009-09-22 11:34:10 (UTC+8)
    Publisher: 國立中央大學圖書館
    Abstract: 競標是一種議訂價格的程序,也是各種決定商品價格的方法中最基本及最重要的一種。商品的售價能藉由競標市場中的互動來決定。在現實的環境中,為了因應各種不同的商業目的而發展出了許多不同型態的競標機制,例如英式競標、荷式競標、密封式競標、維克瑞 (Vickrey) 式競標等。在最近幾年來,由於網際網路的蓬勃發展,所以許多傳統的交易方式也漸漸地朝向電子化轉型,其中,電子競標更是因為網際網路無遠弗界的特性而受到了許多的注目。然而,不同於傳統面對面競標,在電子競標中很容易發生如擋標、誘標等問題,使得商品的價格無法被正確的決定,因而讓競標失去了原先的意義。因此,為了滿足安全及公平的原則,在設計電子競標系統時需考慮不可否認、公開驗證、匿名、標價機密、無收據等性質。本論文將深入探討這些性質,並提出一滿足此五個性質的電子密封式競標系統。 到目前為止已有多種電子密封式競標系統被發表。在本論文的第二章中首先將會根據開標程序執行者的不同而將這些電子密封式競標系統分為兩大類別;一類是由競標者本身來執行開標程序,另一類則是由拍賣商來執行開標程序。接著本論文將會分別對這兩類別的優缺點加以分析,並回顧四個著名的電子密封式競標系統。在第二章的最後一節將會就安全性、效率性以及其他性質來對這四個競標系統做比較。 在第三章中將會解釋無收據性質的重要性並提出一種結合智慧卡的無收據電子密封式競標系統。此系統以結合智慧卡及機率式加密器的方式,來改良先前系統所需要的一種稱為單向不可竊聽通道的不合理假設,並利用單向雜湊函數來設計而增加整體的效能。在本章的最後將會詳細地分析此系統並證明此系統確實滿足前述的五個性質,然後將此系統與先前系統詳細比較,以證明此系統在整體效能上的優越性。 在本論文第四章中將會先回顧一由日本學者千田 (Chida) 等人所提出的電子密封式競標系統,然後再以實例方式來詳細說明此系統第一開標協定的安全漏洞。接著本論文將會探討根據此安全漏洞所引申出來的數值比較問題,然後提出一種有效率的方法來解決此問題。在本章的最後將會提出一種基於此數值比較方法的開標協定,此開標協定不但同樣地改良千田第一開標協定的安全漏洞,同時也比千田第二開標協定更有效率。 Auctions are a form of price negotiation and one of the most basic and important methods for establishing the price of goods. In an auction, goods can be sold at a price determined by interactions in the market. Many types of auctions have been practiced in various situations. In recent years, the Internet has rapidly spread, and thus it has accelerated the development of the trading on the Internet. For this reason, an auction business extends rapidly on the Internet. However, this rapid development of electronic auction results in many problems at the same time. For realizing a fair and secure electronic auction scheme, there are five requirements should be satisfied. They are non-repudiation, public verifiability, anonymity, secrecy of bidding price and receipt-freeness, respectively. To date, many electronic sealed-bid auction schemes have been proposed for satisfying different security requirements. In Chapter 2, these electronic sealed-bid auction schemes will be classified into two categories depending on how the sealed-bids are opened in the opening phase. Four well-known schemes will be reviewed and then compared with one another in terms of security, efficiency, and other properties in the end of this chapter. In Chapter 3, a new efficient receipt-free sealed-bid auction scheme by using smart card will be proposed. The proposed scheme is the first practicable receipt-free sealed-bid auction scheme. It takes advantage of combining the smart card with a probabilistic encryption to improve an unreasonable assumption of the previous scheme, and employs the one-way hash function to increase the efficiency. In the end of this chapter, the proposed scheme will be compared with the previous scheme in terms of security and efficiency. In Chapter 4, a security flaw of the first opening protocol of the previous scheme will be shown by giving an instance. As a result of the security flaw, a value-comparing problem is described and then a new value-comparing method is proposed. The method is a general model that can be implemented by using variant cryptographic primitives according to different situations. Furthermore, in order to repair the security flaw, an improved opening protocol based on the new value-comparing method will be proposed. The improved opening protocol not only repairs the security flaw, but also has more efficiency than the second opening protocol of the previous scheme.
    Appears in Collections:[資訊工程研究所] 博碩士論文

    Files in This Item:

    File SizeFormat
    0KbUnknown641View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明