|
[1] G. Ateniese and G. Tsudik, “Some Open Issues and New Directions in Group Signatures”, Proceedings of Financial Cryptography’99, pp. 196-211, 1999. [2] C. Cachin, “Efficient Private Bidding and Auctions with an Oblivious Third Party”, Proceedings of the 6th ACM conference on Computer and Communications Security, pp. 120-127, 1999. [3] J. Camenisch and M. Stadler, “Efficient Group Signature Schemes for Large Groups”, Advances in Cryptology — CRYPTO’97, pp. 106-121, 1999. [4] M. Franklin and M. Reiter, “The design and implementation of a secure auction service”, IEEE Transactions on Software Engineering, No. 22, Vol 5, pp. 302-312, 1996. [5] D. Hirakiuchi and K. Sakurai, “English vs. Sealed Bid in Anonymous Electronic Auction Protocols”, Enabling Technologies: Infrastructure for Collaborative Enterprises, 2001. WET ICE 2001. Proceedings of the Tenth IEEE International Workshops, pp. 171 —176, 2001. [6] K. Kobayashi, H. Morita, K. Suzuki, and M. Hakuta, “Efficient Sealed-bid Auction by Using One-way Functions”, IEICE Transactions Fundamentals, E84-A(1):289-294, 2001. [7] M. Kumar and S. Feldman, “Internet Auctions”, Proceedings of the Third USENIX Workshop on Electronic Commerce, pp. 49-60, 1998. [8] B. Lee, K. Kim and J. Ma, “Efficient Public Auction with One-Time Registration and Public Verifiability”, Proceedings of the International Conference on INDOCRYPT 2001, pp. 162-174, 2001. [9] T. Mullen and M. Wellman, “The auction manager: Market middleware for large-scale electronic commerce”, Proceedings of the Third USENIX Workshop on Electronic Commerce, pp 49-60, 1998. [10] K. Nguyen and J. Traore, “An Online Public Auction Protocol Protecting Bidder Privacy”, Proceedings of Australasian Conference on Information Security and Privacy 2000, pp. 427-442, 2000. [11] NIST FIPS PUB 180-1, “Secure Hash Standard”, Federal Information Processing Standards Publication 46, U. S. Department of Commerce, 1995. [12] A. Odlyzko, “Discrete logarithms the past and the future”, Design Codes and Cryptography, Vol. 19, No. 2/3, pp. 129-145, 2000. [13] K. Omote and A. Miyaji, “An anonymous auction protocol with a single non-trusted center using binary trees”, Proceedings of Information Security Workshop 2000, pp. 108-120, 2000. [14] K. Omote and A. Miyaji, “A Practical English Auction with One-Time Registration”, Proceedings of Australasian Conference on Information Security and Privacy 2001, pp. 221-234, 2001. [15] K.Sako, “An Auction Protocol Which Hides Bids of Losers”, Proceedings of Public Key Cryptography 2000, pp. 422-432, 2000. [16] C. P. Schnorr, “Efficient signature generation by smart cards”, Journal of Cryptology, No. 4, Vol. 3, pp. 161-174, 1991. [17] S. G. Stubblebine and P. F. Syverson, “Fair On-line Auction Without Special Trusted Parties”, Proceedings of Financial Cryptography’99, pp. 230-240, 1999. [18] K. Suzuki, K. Kobayashi, and H. Morita, “Efficient sealed-bid auction using hash chain”, Proceedings of International Conference on Information Security and Cryptology 2000, pp. 189-197, 2000.
|