Academic
Publications
Anonymity and Security in Continuous Double Auctions for Internet Retails Market

Anonymity and Security in Continuous Double Auctions for Internet Retails Market,10.1109/HICSS.2004.1265431,Changjie Wang,Ho-fung Leung

Anonymity and Security in Continuous Double Auctions for Internet Retails Market   (Citations: 9)
BibTex | RIS | RefWorks Download
Electronic auctions have become an integral part of Elec- tronic Commerce nowadays. Besides the popular sin- gle-sided auction protocols, i.e. English auction, Vickrey auction etc., Continuous Double Auction (CDA) is an important auction protocol that permits multiple buyers and sellers to trade goods. Internet CDAs have been widely used in financial and commodities markets. Al- though Internet provides an excellent infrastructure for CDAs, anonymity and security are important issues in the electronic CDA marketplaces. While most studies have been focusing on the strategies in agent-oriented CDAs (2)(3)(4)(5), relatively little research has been done on the privacy and security issues. In this paper, we first discuss the privacy and security issues in electronic CDAs, and propose that the security requirements in electronic CDAs include anonymity, traceability, impossibility of impersonation, unforgeablility, and verifiability. We then describe an anonymous and secure CDA protocol for electronic marketplaces. In the new protocol, both the anonymity of traders and the traceability of false offers are achieved. The identities of normal traders and their bidding behaviors are protected, while the identities of malicious traders can be revealed. With a simple analy- sis, we show that our CDA scheme satisfies all the re- quired security properties.
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...There are two existing proposals for conducting secure and anonymous CDAs (see Wang and Leung (2004) and Trevathan et al (2006))...

    Jarrod Trevathanet al. A SOFTWARE ARCHITECTURE FOR CONTINUOUS DOUBLE AUCTIONS

    • ...Wang and Leung’s scheme [21], to our knowledge, is the only auction scheme proposed that specifically addresses CDA security...
    • ...Wang and Leung’s scheme [21] is the first attempt to conduct secure CDAs while preserving the anonymity of bidders...
    • ...Registration with RM in [21] -Suppose RM uses the RSA system with public parameters n;e as the RSA modulo and the encryption key, respectively...
    • ...As a result, Wang and Leung’s CDA [21] scheme is susceptible to this attack...
    • ...This method has been used by Viswanathan et al [20], and Wang and Leung [21] to provide verifiability of the matching process...
    • ...The schemes compared include: Wang and Leung [21] (WL04), Anteniese et al. [1] (ACJT00), Camenisch and Lysyankaya [4] (CL02), and Tsudik and Xu [19] (TX03)...

    Jarrod Trevathanet al. An Anonymous and Secure Continuous Double Auction Scheme

    • ...We will give an example of a two-server trust scheme in the next section [7, 13]...
    • ...Bulletin boards are used in many schemes proposed in literature (see [9, 13])...

    Jarrod Trevathan. Security, anonymity and trust in electronic auctions

    • ...In fact, blind signature, fair blind signature, group signature, group blind signature, zero-knowledge proof, undiable protocol, fairly good exchange protocol, secret sharing, verifiable secret sharing are the most popular technologies that can be employed to enhance privacy and anonymity[5-8]...

    Zhaofeng Maet al. Secure Anonymous Communication with Conditional Traceability

    • ...Although a number of secure protocols have been proposed for public Internet activities (such as electronic public auctions [1] [2]), the security and privacy of public Internet forums has not attracted much attention, despite of its importance...
    • ...So far, most related researches have focused on electronic payment [5] [7], electronic auctions [1] [2], electronic voting [8] [9] [10], electronic contracting, etc...
    • ...Internet forums, we design a new practical protocol for Internet forums based on [1]...

    Changjie Wanget al. Anonymity and Security in Public Internet Forums

Sort by: