Computer Science – Cryptography and Security
Scientific paper
2011-09-02
International Journal of Information Technology Convergence and Services (IJITCS) Vol.1, No.4, August 2011
Computer Science
Cryptography and Security
9 pages, 1 figure and 2 tables
Scientific paper
10.5121/ijitcs.2011.1401
The use of e-Auction services has been increasing in recent years. Security requirements in conducting e-Auctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with asymmetric models in which the commercial entity of an auction issuer or registration manager is assumed in addition to the auctioneer. Multi-attribute reverse auctions promise higher market efficiency and effective information exchange. This work extends and uses the existing schemes. This scheme uses scoring function, winner determination in multi-attribute auctions to implement public verifiability. Anonymity is achieved through bidder side pseudonym generation. By results and analysis we say this is very simple and effective scheme. This scheme ensures public verifiability and anonymity in multi-attribute auctions without revelation of the bids received, third parties and complex communications.
Pais Alwyn Roshan
Singh Mahendra Pratap
Srinath T. R.
No associations
LandOfFree
Anonymity and verifiability in multi-attribute reverse auction does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Anonymity and verifiability in multi-attribute reverse auction, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Anonymity and verifiability in multi-attribute reverse auction will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-687422