Efficient First-price Sealed E-auction Protocol Under Secure Multi-party Computational Malicious Model

Da-Wei Zhou Da-Wei Zhou, Su-Zhen Cao Da-Wei Zhou, Xiao Zhao Su-Zhen Cao, Dan-Dan Xing Xiao Zhao, Zheng Wang Dan-Dan Xing
{"title":"Efficient First-price Sealed E-auction Protocol Under Secure Multi-party Computational Malicious Model","authors":"Da-Wei Zhou Da-Wei Zhou, Su-Zhen Cao Da-Wei Zhou, Xiao Zhao Su-Zhen Cao, Dan-Dan Xing Xiao Zhao, Zheng Wang Dan-Dan Xing","doi":"10.53106/199115992024023501005","DOIUrl":null,"url":null,"abstract":"\n To solve the problems of existing e-auction protocols such as semi-trustworthiness of outsourced third parties, collusive attacks among participants, unsatisfactory decentralized structure, and inability of public verification, we propose an efficient first-price sealed e-auction protocol under a secure multi-party computational malicious model. First, the protocol combines the additive homomorphism of the ElGamal cryptographic algorithm to achieve a decentralized structure and eliminate the problem of semi-trustworthiness of outsourced third parties; it uses (n, n) threshold encryption and decryption techniques to solve the problem of collusion attacks among participants and uses Hash-based Message Authentication Code (HMAC) technology to achieve public verifiability of auction results. Additionally, the protocol proposes a method to quickly find the maximum value of the data encoding, which can avoid multiple processing of confidential data and thus effectively reduce the number of communication rounds. The combination of zero-knowledge proof and ideal/realistic simulation paradigm proves that the protocol in this paper is resistant to up to n-1 party collusion attacks and satisfies the security of the secure multi-party computational malicious model. Finally, after theoretical analysis and simulation experiments, the protocol not only satisfies higher security performance but also has greater overall operational efficiency.\n \n","PeriodicalId":345067,"journal":{"name":"電腦學刊","volume":"1300 ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"電腦學刊","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53106/199115992024023501005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

To solve the problems of existing e-auction protocols such as semi-trustworthiness of outsourced third parties, collusive attacks among participants, unsatisfactory decentralized structure, and inability of public verification, we propose an efficient first-price sealed e-auction protocol under a secure multi-party computational malicious model. First, the protocol combines the additive homomorphism of the ElGamal cryptographic algorithm to achieve a decentralized structure and eliminate the problem of semi-trustworthiness of outsourced third parties; it uses (n, n) threshold encryption and decryption techniques to solve the problem of collusion attacks among participants and uses Hash-based Message Authentication Code (HMAC) technology to achieve public verifiability of auction results. Additionally, the protocol proposes a method to quickly find the maximum value of the data encoding, which can avoid multiple processing of confidential data and thus effectively reduce the number of communication rounds. The combination of zero-knowledge proof and ideal/realistic simulation paradigm proves that the protocol in this paper is resistant to up to n-1 party collusion attacks and satisfies the security of the secure multi-party computational malicious model. Finally, after theoretical analysis and simulation experiments, the protocol not only satisfies higher security performance but also has greater overall operational efficiency.  
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
安全多方计算恶意模型下的高效一口价密封电子拍卖协议
为了解决现有电子拍卖协议中存在的外包第三方半可信、参与者串通攻击、分散结构不理想、无法公开验证等问题,我们提出了一种安全多方计算恶意模型下的高效第一价格密封电子拍卖协议。首先,该协议结合了ElGamal加密算法的加法同态性,实现了去中心化结构,消除了外包第三方的半可信性问题;采用(n,n)阈值加解密技术解决了参与者之间的串通攻击问题,采用基于哈希的消息验证码(HMAC)技术实现了拍卖结果的公开可验证性。此外,该协议还提出了一种快速找到数据编码最大值的方法,可以避免对机密数据的多次处理,从而有效减少通信轮数。零知识证明和理想/现实仿真范式的结合证明,本文的协议最多可抵御 n-1 方的串通攻击,满足安全多方计算恶意模型的安全性要求。最后,经过理论分析和仿真实验,该协议不仅满足更高的安全性能,而且具有更高的整体运行效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Novel Deep Neural Network for Facial Beauty Improvement ACANet: A Fine-grained Image Classification Optimization Method Based on Convolution and Attention Fusion Retinal OCT Image Classification Based on CNN-RNN Unified Neural Networks Beam Tracking Based on a New State Model for mmWave V2I Communication on 3D Roads Research on Strategies for Improving the Quality of English Blended Teaching in Vocational Colleges through Network Informatization Resources
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1