|dc.description.abstract||Auctions are a form of price negotiation and one of the most basic and important methods for establishing the price of goods. In an
auction, goods can be sold at a price determined by interactions in the market. Many types of auctions have been practiced in various situations. In recent years, the Internet has rapidly spread, and thus it has accelerated the development of the trading on the Internet. For this reason, an auction business extends rapidly on the Internet. However, this rapid development of electronic auction results in many problems at the same time. For realizing a fair and secure electronic auction scheme, there are five requirements should be satisfied. They are non-repudiation, public verifiability, anonymity, secrecy of bidding price and receipt-freeness, respectively.
To date, many electronic sealed-bid auction schemes have been proposed for satisfying different security requirements. In Chapter 2, these electronic sealed-bid auction schemes will be classified into two categories depending on how the sealed-bids are opened in the opening phase. Four well-known schemes will be reviewed and then compared with one another in terms of security, efficiency, and other properties in the end of this chapter.
In Chapter 3, a new efficient receipt-free sealed-bid auction scheme by using smart card will be proposed. The proposed scheme is the first practicable receipt-free sealed-bid auction scheme. It takes advantage of combining the smart card with a probabilistic encryption to improve an unreasonable assumption of the previous scheme, and employs the one-way hash function to increase the efficiency. In the end of this chapter, the proposed scheme will be compared with the previous scheme in terms of security and efficiency.
In Chapter 4, a security flaw of the first opening protocol of the previous scheme will be shown by giving an instance. As a result of the security flaw, a value-comparing problem is described and then a new value-comparing method is proposed. The method is a general model that can be implemented by using variant cryptographic primitives according to different situations. Furthermore, in order to repair the security flaw, an improved opening protocol based on the new value-comparing method will be proposed. The improved opening protocol not only repairs the security flaw, but also has more efficiency than the second opening protocol of the previous scheme.||en_US|