Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer

Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer Purpose – In traditional commerce, an auction is known as a mechanism of determining the value of a commodity that does not have a fixed price. Auctions are exciting and an increasing number of transactions are performed through e‐auctions. But most current auctions cannot address all the important security requirements. Usually, auction systems force bidders and sellers to trust the auctioneer and, on the other hand, do not provide anonymity for bidders and sellers. This paper aims to solve these problems by presenting an efficient anonymous secure auction schema (ASAS) without a fully trustworthy auctioneer. Design/methodology/approach – The paper analyzes security properties and the complexity of previous works in auction security and then proposes a new ASAS that is more secure and efficient than previous works. Finally, security properties and the complexity of the new schema and previous works are compared with one another. Findings – The proposed auction protocol does not force bidders and sellers to trust the auctioneer. In addition, it provides anonymity for both of them. Owing to these newly added features and high degree of security of ASAS, it is suggested that its use in high‐value auctions should require tighter security. Originality/value – The paper proposes a new schema for electronic auctions that is secure and efficient and, in addition, does not force bidders and sellers to trust the auctioneer. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Information Management & Computer Security Emerald Publishing

Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer

Loading next page...
 
/lp/emerald-publishing/efficient-anonymous-secure-auction-schema-asas-without-fully-rojf7M75xX
Publisher
Emerald Publishing
Copyright
Copyright © 2008 Emerald Group Publishing Limited. All rights reserved.
ISSN
0968-5227
DOI
10.1108/09685220810893225
Publisher site
See Article on Publisher Site

Abstract

Purpose – In traditional commerce, an auction is known as a mechanism of determining the value of a commodity that does not have a fixed price. Auctions are exciting and an increasing number of transactions are performed through e‐auctions. But most current auctions cannot address all the important security requirements. Usually, auction systems force bidders and sellers to trust the auctioneer and, on the other hand, do not provide anonymity for bidders and sellers. This paper aims to solve these problems by presenting an efficient anonymous secure auction schema (ASAS) without a fully trustworthy auctioneer. Design/methodology/approach – The paper analyzes security properties and the complexity of previous works in auction security and then proposes a new ASAS that is more secure and efficient than previous works. Finally, security properties and the complexity of the new schema and previous works are compared with one another. Findings – The proposed auction protocol does not force bidders and sellers to trust the auctioneer. In addition, it provides anonymity for both of them. Owing to these newly added features and high degree of security of ASAS, it is suggested that its use in high‐value auctions should require tighter security. Originality/value – The paper proposes a new schema for electronic auctions that is secure and efficient and, in addition, does not force bidders and sellers to trust the auctioneer.

Journal

Information Management & Computer SecurityEmerald Publishing

Published: Jul 18, 2008

Keywords: Auctions; Data security; Electronic commerce

References