Skip to main content

Known Bid Attack on an Electronic Sealed-Bid Auction Scheme

  • Conference paper
  • First Online:
  • 2733 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 424))

Abstract

In this paper, we cryptanalyze a receipt-free electronic sealed-bid auction scheme and show that it is forgeable under the known bid attack. Specifically, we show that a malicious sealer can forge the sealed-bid with non-negligible probability. Besides, we also propose a possible fix for the attack.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proceedings of the Twenty-sixth Annual ACM Symposium on Theory of Computing, pp. 544–553 (1994)

    Google Scholar 

  2. Chang, C.C., Chang, Y.F.: Efficient anonymous auction protocols with freewheeling bids. Comput. Secur. 22(8), 728–734 (2003)

    Article  Google Scholar 

  3. Franklin, M.K., Reiter, M.K.: The design and implementation of a secure auction service. IEEE Trans. Softw. Eng. 22(5), 302–312 (1996)

    Article  Google Scholar 

  4. Howlader, J., Ghosh, A., Pal, T.D.R.: Secure receipt-free sealed-bid electronic auction. In: Ranka, S., Aluru, S., Buyya, R., Chung, Y.-C., Dua, S., Grama, A., Gupta, S.K.S., Kumar, R., Phoha, V.V. (eds.) IC3 2009. CCIS, vol. 40, pp. 228–239. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03547-0_22

    Chapter  Google Scholar 

  5. Howlader, J., Mal, A.K.: Sealed-bid auction a cryptographic solution to bid-rigging attack in the collusive environment. Secur. Commun. Netw. 8(18), 3415–3440 (2015)

    Article  Google Scholar 

  6. Howlader, J., Roy, S.K., Mal, A.K.: Practical receipt-free sealed-bid auction in the coercive environment. In: Lee, H.-S., Han, D.-G. (eds.) ICISC 2013. LNCS, vol. 8565, pp. 418–434. Springer, Cham (2014). doi:10.1007/978-3-319-12160-4_25

    Google Scholar 

  7. Hwang, M.S., Lu, E.J.L., Lin, I.C.: Adding timestamps to the secure electronic auction protocol. Data Knowl. Eng. 40(2), 155–162 (2002)

    Article  MATH  Google Scholar 

  8. Lee, C.C., Lin, T.H., Tsai, C.S.: Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications. Secur. Commun. Netw. 5(12), 1375–1378 (2012)

    Article  Google Scholar 

  9. Liaw, H.T., Juang, W.S., Lin, C.K.: An electronic online bidding auction protocol with both security and efficiency. Appl. Math. Comput. 174(2), 1487–1497 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  10. McAfee, R.P., McMillan, J.: Auctions and bidding. J. Econ. Lit. 25(2), 699–738 (1987)

    MATH  Google Scholar 

  11. Montenegro, J.A., Lopez, J.: A practical solution for sealed bid and multi-currency auctions. Comput. Secur. 45, 186–198 (2014)

    Article  Google Scholar 

  12. Sakurai, K., Miyazaki, S.: An anonymous electronic bidding protocol based on a new convertible group signature scheme. In: Dawson, E.P., Clark, A., Boyd, C. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 385–399. Springer, Heidelberg (2000). doi:10.1007/10718964_32

    Chapter  Google Scholar 

  13. Schoenmakers, B.: A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 148–164. Springer, Heidelberg (1999). doi:10.1007/3-540-48405-1_10

    Google Scholar 

  14. Vickrey, W.: Counterspeculation, auctions, and competitive sealed tenders. J. Finance 16(1), 8–37 (1961)

    Article  MathSciNet  Google Scholar 

  15. Viswanathan, K., Boyd, C., Dawson, E.: A three phased schema for sealed bid auction system design. In: Dawson, E.P., Clark, A., Boyd, C. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 412–426. Springer, Heidelberg (2000). doi:10.1007/10718964_34

    Chapter  Google Scholar 

  16. Wu, C.C., Chang, C.C., Lin, I.C.: New sealed-bid electronic auction with fairness, security and efficiency. J. Comput. Sci. Technol. 23(2), 253–264 (2008)

    Article  Google Scholar 

Download references

Acknowledgment

The authors would like to convey gratitude towards the Malaysia government’s Fundamental Research Grant Scheme (FRGS/2/2014/ICT04/MMU/03/1) for supporting this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kin-Woon Yeow .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Yeow, KW., Heng, SH., Tan, SY. (2017). Known Bid Attack on an Electronic Sealed-Bid Auction Scheme. In: Kim, K., Joukov, N. (eds) Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, vol 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_36

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4154-9_36

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4153-2

  • Online ISBN: 978-981-10-4154-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics