Skip to main content

Study of a Scheme of Bid Evaluation by Experts Based on Chinese Remainder Theorem

  • Conference paper
Applied Informatics and Communication (ICAIC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 224))

Included in the following conference series:

  • 1792 Accesses

Abstract

Bid evaluation, the most important link during a tender phase, is easily influenced negatively by human factors. A method based on Chinese Remainder Theorem is proposed, by which all the experts who grade tender documents are anonymous, all the scores are unknown before they are submitted to a bid invitation unit, and any score is not associated with the identification of an expert. If there are any dishonest behaviors during a bid evaluation, the scores given by dishonest experts can be deleted from the results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hou, Z., Han, J.: Resaerch of( t, n) secret sharing scheme against active cheating. Journal of Zhejiang University (Science Edition) 34(6), 633–635 (2007)

    MathSciNet  MATH  Google Scholar 

  2. Yang, Y., Hou, Z.: Weighted threshold secret sharing scheme based on Mignotte sequence. Application Research of Computers 27(4), 1505–1507 (2010)

    Google Scholar 

  3. Zou, F.: Verifiable secret sharing scheme based on the Mignotte sequence. Journal of Shandong University of Technology(Natural Science Edition) 22(2), 14–16 (2008)

    Google Scholar 

  4. Zhang, J., Ru, X.: Threshold Multiple Secret Sharing Scheme. Computer Engineering and Applications 42(36), 134–135 (2006)

    Google Scholar 

  5. Wang, X.: A secure electronic tender protocol in Internet. Journal of Jinan University(Natural Science) 26(3), 345–349 (2005)

    Google Scholar 

  6. Shamir, A.: How to share a secret. Communications o f the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  7. Lei, l., Tan, Y.: A Research on Applicability of Evaluating Methods of Inviting Bidding. Journal of Air Force Engineering University(Natural Science Edition) 4(3), 87–91 (2003)

    Google Scholar 

  8. Wang, S., Wang, Y., Wang, X., Qin, B.: A zero-knowledge proof scheme of possessing a RSA digital signature. Journal of China Institute of Communications 25(1), 30–33 (2004)

    Google Scholar 

  9. Li, M., Yang, Y.: Revocable anonymous off-line E-cash scheme without TTP. ACTC Electronic SINICA 33(3), 456–458 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sun, X. (2011). Study of a Scheme of Bid Evaluation by Experts Based on Chinese Remainder Theorem. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23214-5_49

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23213-8

  • Online ISBN: 978-3-642-23214-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics