跳到主要內容

臺灣博碩士論文加值系統

(44.200.194.255) 您好!臺灣時間:2024/07/16 11:28
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:黃佩琳
研究生(外文):Pei-Lin Huang
論文名稱:可公開驗證出價合法性的彌封式拍賣系統
論文名稱(外文):A Sealed-Bid Auction with Publicly Verifiable Bid Validity
指導教授:曾文貴曾文貴引用關係
指導教授(外文):Wen-Guey Tzeng
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊科學系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:英文
論文頁數:47
中文關鍵詞:彌封式拍賣可公開驗證出價合法性
外文關鍵詞:Sealed-Bid AuctionPublicly VerifiableBid Validity
相關次數:
  • 被引用被引用:0
  • 點閱點閱:248
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
我們提出了一個具有可公開驗證出價合法性的拍賣系統。我們的想法結合了可驗證的加密知識簽章系統及公開金鑰之重新加密的證明。我們在對管理者的設計上,使用了兩種不同的管理者,註冊管理者及拍賣管理者,避免僅用一種管理者而使得管理者的權限過大。註冊管理者確認出價者的身分及其公開金鑰之間的對應關係,拍賣管理者則是管理拍賣時的一切活動。在我們的系統中,出價合法性不只包括了對出價價格的合法性更包括了出價者身分的合法性。我們最主要的設計便是使任何第三者都可以公開的驗證出價者出價的合法性卻又得不到與出價者身分及出價價格相關的任何訊息。如果任何人發現有不合法的出價都可以向拍賣管理者檢舉進而要求拍賣管理者撤銷該筆出價。因此我們的系統可以抵抗惡意的出價者提出不合法的出價干擾拍賣。
除此之外,在我們的系統中,我們將出價者的簽章和出價價格結合當做出價內容。而我們系統中所使用的簽章簽名時需要出價者所記憶的密碼與儲存在出價者可攜式裝置中的部分私鑰一同配合使用,藉以增加安全性。
We proposed a sealed-bid auction with publicly verifiable bid validity, which is based on verifiable encryption of signature of knowledge and 1-out-of-P re-encryption proof of encryption keys. In our scheme, we have two semi-trusted managers, the registration manager RM and the auction manager AM. The registration manager RM guarantees the relationship between a bidder and his corresponding public key. The auction manager AM holds an auction and manages operations in an auction. Bid validity in our scheme contains the validity of both bidding price and the bidder. In our scheme, every one can verify the validity of the bid, but he can not get any information about the relation of the bidder’s identity and his bidding price. If there are invalid bids, anyone can ask the auction manager AM to revoke them. Hence, our scheme can prevent malicious bidders to disturb the auction.
Besides, in our scheme, we combine the bidder’s signature and his bidding price as the bid. The signature we use here needs the bidder’s password memorized in his mind and the corresponding partial secret stored in his mobile device to increase the security.
Table of Contents
摘要------------------------------------------------------i
Abstract-------------------------------------------------ii
誌謝----------------------------------------------------iii
Table of Contents----------------------------------------iv
Chapter 1 Introduction------------------------------------1
1.1 Auction Types-----------------------------------------2
1.2 The Properties of Sealed-Bid Auctions-----------------4
1.3 Thesis organization-----------------------------------5
Chapter 2 Preliminaries-----------------------------------7
2.1 Interactive Zero-Knowledge Proof System of Knowledge--7
2.2 Signature of Knowledge-------------------------------11
2.3 Verifiable Encryption of Signature of Knowledge------12
2.4 1-out-of-P Re-encryption Proof of Encryption Keys----15
2.5 Previous Electronic Auction Schemes------------------18
Chapter 3 A Sealed-Bid Auction with Publicly Verifiable Bid Validity-------------------------------------------------22
3.1 Notations--------------------------------------------23
3.2 Our Basic Scheme-------------------------------------24
3.3 Analysis---------------------------------------------32
3.3.1 Security-------------------------------------------32
3.3.2 Properties-----------------------------------------40
Chapter 4 Conclusion-------------------------------------43
Bibliography---------------------------------------------45
Bibliography
[1] C. Cachin, “Efficient private bidding and auctions with an oblivious third party,” In Proceedings of the 6th ACM conference on Computer and communications security, pages 120-127. ACM Press, 1999.
[2] H. Kikuchi, “(M + 1)-st price auction,” In Paul F. Syverson, editor, Financial Cryptography, 5th International Conference, FC 2001, volume 2339 of Lecture Notes in Computer Science, pages 351-363. Springer-Verlag, 2002.
[3] H. Kikuchi,M. Harkavy, and J. D. Tygar, “Multi-round anonymous auction protocols,” In Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pages 62-69, 1998.
[4] H. Kikuchi, S. Hotta, K.Abe, and S. Nakanishi, “Distributed auction servers resolving winner and winning bid without revealing privacy of bids,” In Proceedings of International Workshop on Next Generation Internet (NGITA 2000), pages 307-312, 2000.
[5] J. Camenisch and I. Damgard, “Verifiable encryption, group encryption, and their Applications to separable group signatures and signature sharing schemes,” In Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 331-345. Springer-Verlag, 2000.
[6] K. Omote and A. Miyaji, “A second-price sealed-bid auction with verifiable discriminant of p0-th root,” In Matt Blaze, editor, Financial Cryptography, 6th International Conference, FC 2002, volume 2357 of Lecture Notes in Computer Science, pages 57-71. Springer-Verlag, 2003.
[7] K. Peng, C. Boyd, E. Dawson, and K. Viswanathan, “Five sealed-bid auction models,” In Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, pages 77-86. Australian Computer Society, 2003.
[8] K. Suzuki, K. Kobayashi, and H. Morita, “Efficient sealed-bid auction using hash chain,” In Dongho Won, editor, Information Security and Cryptology - ICISC 2000, volume 2015 of Lecture Notes in Computer Science, pages 183-191. Springer-Verlag, 2000.
[9] M. Abe and K. , “M + 1-st price auction using homomorphic encryption,” In David Naccache and Pascal Paillier, editor, Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, volume 2274 of Lecture Notes in Computer Science, pages 115-124. Springer-Verlag, 2002.
[10] M. Harkavy and J. D. Tygar and H. Kikuchi, “Electronic auctions with private bids,” In Proceeding of 3rd USENIX Workshop on Electronic Commerce, 1998.
[11] M. Hirt and K. Sako, “Efficient receipt-free voting based on homomorphic encryption,” In Bart Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 539-556. Springer-Verlag, 2000.
[12] M. K. Franklin and M. K. Reiter, “The design and implementation of a secure auction service,” In IEEE Transactions on Software Engineering, pages 302-312, IEEE Computer Society, 1996.
[13] M. Naor, B. Pinkas and R. Sumner, “Privacy preserving auctions and mechanism design,” In Proceedings of the 1st ACM conference on Electronic commerce, pages 129-139. ACM Press, 1999.
[14] S. Liu, C. Wang, and Y. Wang, “A secure multi-round electronic auction scheme,” In Proceedings of the EUROCOMM 2000, pages 330-334. Germany, May 2000.
[15] S. Shin, K. kobara, and H. Imai, “Leakage-resilient authenticated key establishment protocols,” In Chi-Sung Laih, editor, Advances in Cryptology - ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 155-172. Springer-Verlag, 2000.
[16] Y. Watanabe and H. Imai, “Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP,” In Proceedings of the 7th ACM Conference on Computer and Communications Security, pages 80-86. ACM Press, 2000.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關論文
 
1. 方德隆(1999)。九年一貫課程基本理念與內涵。公教資訊,第3卷第2期,1-18頁。
2. 方崇雄、張玉山(2003)。九年一貫生活科技之教學活動設計。研習資訊,第20卷第6期,63-75頁。
3. 方崇雄、林坤誼(2003)。九年一貫國中生活科技學域基本能力指標的詮釋與評量。研習資訊,第20卷第3期,19-33頁。
4. 汪嘉龢(1974)。協同教學的實驗與研究。女師專學報,第4期,1-21頁。
5. 李春芳(2003)。國內教育改革的現況與未來新展望。研習資訊。第20卷第6期,44-62頁。
6. 吳清山(1995)。美國90年代教育改革的動向。教師天地,第78期,71-76頁。
7. 吳清山(1999)。推行「國民教育階段九年一貫課程」學校行政配合之探究。教育研究資訊,第7卷第1期,14-21頁。
8. 吳俊憲(2001)。小學實施英語教育的困境與突破。國教世紀,第195期,25-28頁。
9. 余安邦(1999)。夢中情人-九年一貫課程。教育資料與研究,第26期,19-22頁。
10. 呂豐謀(2000)談九年一貫課程教材統整與教學。人文及社會學科教學通訊,第11卷第4期,64-72頁。
11. 秦夢群(2001)。美國一九九0年代後之教育改革及對我國之啟示。教育資料與研究,第43期,1-8頁。
12. 秦葆琦(2003)。九年一貫新課程鄉土教育的革新與因應之道──社會領域四下各版本之鄉土單元分析。研習資訊。第20卷第2期,77-91頁。
13. 陳伯璋(1999)。九年一貫課程綱要修訂的背景及內涵。教育研究資訊,第7卷第1期,1-13頁。
14. 陳清溪(2003)。從國民中小學一貫課程綱要談教學評量。研習資訊。20(3),58-66。台北:國立教育研究院籌備處。
15. 陳新轉(2003)。「科際整合」觀念在課程與教學英用上的迷思、省思與改進建議。研習資訊。第20卷第4期,26-34頁。