TY - GEN
T1 - Some remarks on security of receipt-free E-auction
AU - Her, Yong Sork
AU - Imamoto, Kenji
AU - Sakurai, Kouichi
PY - 2005
Y1 - 2005
N2 - Recently, a receipt-free scheme is rising for a secure e-auction. The goal of a receipt-free scheme in an e-auction is to prevent a bid-rigging. If the bid-rigging happens in the e-auction. the winner can get the bidding item with an unreasonably low price. The first receipt-free scheme tea: the e-auction was proposed by Abe and Suzuki. Chen, Lee and Kim also proposed the extended receipt-free scheme. In this paper, we point out that the proposed receipt-free schemes do nor prevent perfectly the bid-rigging attack. Moreover, we indicate that a bid-collision is a possible cause of an e-auction. In the strict sense, the bid-collusion is different fro m the bid-rigging. In this paper, we do not present the scheme which can prevent the bid-collision attack. We compare the bid-rigging attack with the bid-collusion attack, and analyze the security of the existed receipt-free schemes in a viewpoint of the bidrigging attack and the bid-collusion attack.
AB - Recently, a receipt-free scheme is rising for a secure e-auction. The goal of a receipt-free scheme in an e-auction is to prevent a bid-rigging. If the bid-rigging happens in the e-auction. the winner can get the bidding item with an unreasonably low price. The first receipt-free scheme tea: the e-auction was proposed by Abe and Suzuki. Chen, Lee and Kim also proposed the extended receipt-free scheme. In this paper, we point out that the proposed receipt-free schemes do nor prevent perfectly the bid-rigging attack. Moreover, we indicate that a bid-collision is a possible cause of an e-auction. In the strict sense, the bid-collusion is different fro m the bid-rigging. In this paper, we do not present the scheme which can prevent the bid-collision attack. We compare the bid-rigging attack with the bid-collusion attack, and analyze the security of the existed receipt-free schemes in a viewpoint of the bidrigging attack and the bid-collusion attack.
UR - http://www.scopus.com/inward/record.url?scp=33646811545&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33646811545&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:33646811545
SN - 0769523161
SN - 9780769523163
T3 - Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
SP - 560
EP - 563
BT - Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
T2 - 3rd International Conference on Information Technology and Applications, ICITA 2005
Y2 - 4 July 2005 through 7 July 2005
ER -