Security, anonymity and trust in electronic auctions

Jarrod Trevathan
{"title":"Security, anonymity and trust in electronic auctions","authors":"Jarrod Trevathan","doi":"10.1145/1144396.1144398","DOIUrl":null,"url":null,"abstract":"Auctioning items over the Internet is a popular and lucrative industry.There are now many companies that conduct auctions online such as eBay [5] and onSale [10]. Online auctions have geographical advantages over traditional auctions as buyers and sellers are not required to be physically present at a central location (such as a hall or open air venue). This allows online auctions to be much larger and more elaborate than traditional auctions.However, it also provides opportunities for the auction participants to cheat. \n \nA bidder can cheat by repudiating bids, failing to pay, or colluding with other bidders to affect the settlement price.Likewise, the seller of the item might fail to deliver the goods, or could be in collusion with some of the bidders.Someone could also forge a bid in an attempt to frame a bidder, or introduce fake bids in order to influence the auction proceedings. \n \nFurthermore, bidders are required to trust the auctioneer with their identity and bid information.A corrupt auctioneer could award the auction to someone other than the legitimate winner.A bidder's personal information could also be sold to marketing agencies, or used for malicious purposes. \n \nCommercial auction sites fail in many of the aforementioned circumstances. These sites only offer basic solutions that are designed to \"clean up\" after wrongdoing has taken place.However, cryptography can be used to solve some of these problems up-front.An \"electronic auction\" is a cryptographic scheme designed to securely conduct auctions while protecting the identities of the bidders. \n \nIn this article we describe two popular types of electronic auctions. We discuss the security issues associated with conducting these auctions and contrast the differing anonymity requirements.We also identify four main strategies for reducing the trust that bidders must place in the auctioneer.Furthermore, we present a basic example of an electronic auction scheme.This is used to illustrate the complexity involved in designing a secure and anonymous auction scheme. Finally, we discuss some of our research with regard to using group signature schemes to constructelectronic auctions.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Crossroads","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1144396.1144398","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23

Abstract

Auctioning items over the Internet is a popular and lucrative industry.There are now many companies that conduct auctions online such as eBay [5] and onSale [10]. Online auctions have geographical advantages over traditional auctions as buyers and sellers are not required to be physically present at a central location (such as a hall or open air venue). This allows online auctions to be much larger and more elaborate than traditional auctions.However, it also provides opportunities for the auction participants to cheat. A bidder can cheat by repudiating bids, failing to pay, or colluding with other bidders to affect the settlement price.Likewise, the seller of the item might fail to deliver the goods, or could be in collusion with some of the bidders.Someone could also forge a bid in an attempt to frame a bidder, or introduce fake bids in order to influence the auction proceedings. Furthermore, bidders are required to trust the auctioneer with their identity and bid information.A corrupt auctioneer could award the auction to someone other than the legitimate winner.A bidder's personal information could also be sold to marketing agencies, or used for malicious purposes. Commercial auction sites fail in many of the aforementioned circumstances. These sites only offer basic solutions that are designed to "clean up" after wrongdoing has taken place.However, cryptography can be used to solve some of these problems up-front.An "electronic auction" is a cryptographic scheme designed to securely conduct auctions while protecting the identities of the bidders. In this article we describe two popular types of electronic auctions. We discuss the security issues associated with conducting these auctions and contrast the differing anonymity requirements.We also identify four main strategies for reducing the trust that bidders must place in the auctioneer.Furthermore, we present a basic example of an electronic auction scheme.This is used to illustrate the complexity involved in designing a secure and anonymous auction scheme. Finally, we discuss some of our research with regard to using group signature schemes to constructelectronic auctions.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
电子拍卖的安全性、匿名性和可信度
在互联网上拍卖物品是一个受欢迎且利润丰厚的行业。现在有很多公司在网上进行拍卖,如eBay[5]和onSale[10]。与传统拍卖相比,在线拍卖具有地理优势,因为买家和卖家不需要实际出现在中心位置(如大厅或露天场所)。这使得在线拍卖比传统拍卖规模更大、更精细。然而,这也为拍卖参与者提供了作弊的机会。投标人可以通过拒绝投标、不付款或者与其他投标人串通影响结算价格等方式进行欺诈。同样,物品的卖方可能无法交付货物,或者可能与一些投标人勾结。有人还可能伪造出价,试图陷害竞标者,或引入虚假出价,以影响拍卖程序。此外,竞买人必须信任拍卖人,将其身份和出价信息告知拍卖人。腐败的拍卖商可能会把拍卖权授予合法赢家以外的人。竞标者的个人信息也可能被出售给营销机构,或被用于恶意目的。商业拍卖网站在上述许多情况下都失败了。这些网站只提供基本的解决方案,旨在在不法行为发生后进行“清理”。然而,密码学可以用来预先解决其中的一些问题。“电子拍卖”是一种加密方案,旨在安全地进行拍卖,同时保护投标人的身份。在本文中,我们描述了两种流行的电子拍卖类型。我们将讨论与进行这些拍卖相关的安全问题,并对比不同的匿名要求。我们还确定了四种主要策略,以减少竞标者必须对拍卖师的信任。此外,我们提出了一个电子拍卖方案的基本例子。这是用来说明设计一个安全和匿名的拍卖方案所涉及的复杂性。最后,我们讨论了一些关于使用群签名方案构建电子拍卖的研究。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Modeling object states and behaviors using a state action manager Superhuman speech by 2010: an interview with Jennifer Lai At a crossroads: TA-ing first-year computer science Introduction: computer vision and speech Getting started on natural language processing with Python
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1