Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) 2006
DOI: 10.1109/hicss.2006.45
|View full text |Cite
|
Sign up to set email alerts
|

An Anonymous and Secure Continuous Double Auction Scheme

Abstract: A Continuous Double Auction (CDA) allows many buyers and sellers to continuously submit bids for the purchase and sale of a commodity (e.g., online share trading). Protocols protecting privacy in this type of powerful market mechanism are essential. However, until recently the security of CDAs has been given limited coverage. This paper describes a new scheme for conducting an anonymous and secure CDA. We show that any existing secure group signature scheme can be used to implement a CDA which has the followin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
4

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 19 publications
0
6
0
4
Order By: Relevance
“…For users, no other user information can be forged to generate a pseudonym certificate. Since the pseudo-names of other consumer information are generated, it is necessary to satisfy the Formula (11) and (12). However, the user cannot obtain the RM private key to satisfy the above formula, so the user cannot generate the pseudonym certificate through the verification of the MM.…”
Section: B Security Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…For users, no other user information can be forged to generate a pseudonym certificate. Since the pseudo-names of other consumer information are generated, it is necessary to satisfy the Formula (11) and (12). However, the user cannot obtain the RM private key to satisfy the above formula, so the user cannot generate the pseudonym certificate through the verification of the MM.…”
Section: B Security Analysismentioning
confidence: 99%
“…However, its marketing manager has a pseudonym and a real identity correspondence, which is likely to cause the bidder's privacy to leak. Based on the literature [11], a new scheme based on group signature CDA was proposed in paper [12], which not only enables secure anonymity but also adds and removes bidders in bids without affecting the auction process.The electronic auction scheme based on group signature and partial blind signature was proposed in paper [13], which reduced the dependence on trusted third parties. However, [12], [13] all have the problem that group administrators have the supreme right of identity tracking, and it is possible that administrators abuse their power to expose users' privacy [14].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…We are also applying this concept to a form of auction referred to as a continuous double auction, where there aremany buyers and many sellers (e.g., a share market) [11].…”
Section: Research Directions -Group Signaturesmentioning
confidence: 99%
“…A secure and fair cryptographic-system-based protocol for electronic first-price sealed-bid auctions has been proposed by Juang et al, (2005) ensuring soundness, security, anonymity, certifiability and verifiability. Trevathan et al, (2006) improved the protocol proposed by Wang and Leung securing bidders' anonymity and blocking the creation of bidders' profiles. Shih et al, (2006) proposed an efficient protocol for Vickrey eRA's to ensure the certification of the winning bid and the hiding of losing bids.…”
Section: 3 Use Of Ia's For Late Biddingmentioning
confidence: 99%