Skip to main content

Research on the Application of DNA Cryptography in Electronic Bidding System

  • Conference paper
  • First Online:
Bio-inspired Computing: Theories and Applications (BIC-TA 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1160))

Abstract

With the rapid development of bidding market, a new type of bidding method-electronic bidding method has been widely used in the bidding market. This new-type of method is a program that the bidding is completed by graphics and textures. Generally, the electronic bidding provides doubles bidders with the data information of the transaction through the Internet. In this study we propose an information encryption and digital signature method based on DNA cryptography which is combined with HASH function, symmetric encryption and asymmetric encryption comprehensively for the purpose of the information resources’ integrality, usability, security and reliability in the electronic bidding system. The results of the study show that our new method provides double guarantee for the bidding system under the role of symmetric encryption and asymmetric encryption used DNA cryptography, and DNA molecular encryption has the characteristics of electronic immunity, concealment, independent of mathematical problems, massive parallelism, etc. It provides a double guarantee for the bidding system. The security analysis results show that the algorithm can effectively protect the security and integrity of the bidder and bidder’s data information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, W.P.: Information security risk analysis in the implementation of electronic bidding. Mod. Bus. 5(9), 261–262 (2010)

    Google Scholar 

  2. Liao, B.X.: Application of CA multiple encryption technology in construction engineering electronic bidding platform. Low-Carbon World 6(32), 252–253 (2016)

    Google Scholar 

  3. Zhang, G.J., Zhang, J.F.: The application of electronic signature technology in online bidding system. J. Changzhou Vocat. Coll. Inf. Technol. 10(4), 22–24 (2011)

    Google Scholar 

  4. Xu, L.X., Wu, X.L., Zhang, X.C.: Application of encryption and digital signature based on online bidding. Comput. Eng. Des. 26(6), 1431–1433 (2005)

    Google Scholar 

  5. Sun, X.: Analyses PKI technology in the application of the electronic bidding. China New Commun. 3(10), 17–18 (2012)

    Google Scholar 

  6. Montenegro, J.A., Lopez, J.: A practical solution for sealed bid and multi currency auctions. Comput. Secur. 45, 186–198 (2014)

    Article  Google Scholar 

  7. Jin, C., Zhao, J.: Certificateless aggregate deniable authentication protocol for ad hoc networks. Int. J. Electron. Secur. Digit. Forensics 10(2), 168–187 (2018)

    Article  Google Scholar 

  8. Xiao, G.Z., Lu, M.X.: DNA computation and DNA coding. J. Eng. Math. 23(1), 1–6 (2006)

    MATH  Google Scholar 

  9. Ben Slimane, N., Aouf, N., Bouallegue, K., Machhout, M.: A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model. Multimed. Tools Appl. 77(23), 30993–31019 (2018). https://doi.org/10.1007/s11042-018-6145-8

    Article  Google Scholar 

  10. Enayatifar, R., Guimaraes, F.G., Siarry, P., et al.: Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt. Lasers Eng. 115, 131–140 (2019)

    Article  Google Scholar 

  11. Xia, S.Y., Xu, D.: Security requirements and solutions of online bidding system. Netw. Secur. Technol. Appl. (7), 34–38 (2003)

    Google Scholar 

  12. Elbaz, J., Lioubashevski, O., Wang, F., et al.: DNA computing circuits using libraries of DNAzyme subunits. Nat. Nanotechnol. 5(6), 417 (2010)

    Article  Google Scholar 

  13. Adleman, L.M.: Molecular computation of solutions to combinatorial problems. Science 266, 1021–1024 (1994)

    Article  Google Scholar 

  14. Ouyang, Q., Kaplan, P., Liu, S., et al.: DNA solution of the maximal clique problem. Science 278(5337), 446–449 (1997)

    Article  Google Scholar 

  15. Lipton, R.: Using DNA to solve NP-complete problems. Science 268(4), 542–545 (1995)

    Article  Google Scholar 

  16. Braich, R.S., Chelyapov, N., Johnson, C., et al.: Solution of a 20-variable 3-SAT problem on a DNA computer. Science 296(5567), 499–502 (2002)

    Article  Google Scholar 

  17. Gifford, D.K.: On the path to computation with DNA. Science 266(5187), 993–994 (1994)

    Article  Google Scholar 

  18. Sakamoto, K., Gouzu, H., Komiya, K., et al.: Molecular computation by DNA hairpin formation. Science 288(5469), 1223–1226 (2000)

    Article  Google Scholar 

  19. Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. Nature 399(6736), 533 (1999)

    Article  Google Scholar 

  20. Gehani, A., Labean, T., Reif, J.: DNA based cryptography. In: Proceedings of the 5th Annual DIMACS Meeting on DNA Based Computers (DNA 5). MIT, Cambridge (1999)

    Google Scholar 

  21. Leier, A., Richter, C., Banzhaf, W., et al.: Cryptography with DNA binary strands. Biosystems 57(1), 13 (2000)

    Article  Google Scholar 

  22. Chen, J.: A DNA based biomolecular cryptography design. In: Proceedings of the 2003 International Symposium on Circuits and Systems, vol. 3, p. 822. IEEE, Piscataway (2003)

    Google Scholar 

  23. Lu, M.X., Lai, X.J., et al.: Symmetric encryption based on DNA technology. Sci. China 37(2), 175–182 (2007)

    Google Scholar 

  24. Le, G.G.C., Blum, L.J., Marquette, C.A.: Shrinking hydrogel-DNA spots generates 3D microdots arrays. Macromol. Biosci. 13(2), 227 (2013)

    Article  Google Scholar 

  25. Zhang, Y., Wang, Z., Wang, Z., et al.: A DNA based encryption method based on two biological axioms of DNA chip and Polymerase Chain Reaction (PCR) amplification techniques. Chem. CA Eur. J. 23(54), 13387–13403 (2017)

    Article  Google Scholar 

  26. Zhang, X.C., et al.: A visual cryptography scheme-based DNA microarrays. Int. J. Perform. Eng. 14(2), 334–340 (2018)

    Google Scholar 

  27. Ning, K.: A pseudo DNA cryptography method. ArXiv preprint arXiv:0903.2693 (2009)

  28. Zhang, X., Han, F., Niu, Y.: Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Comput. Intell. Neurosci. 2017, 11 (2017)

    Google Scholar 

  29. Lai, X.J., Lu, M.X., Qin, L., et al.: Asymmetric encryption and signature method with DNA technology. Sci. China Ser. F (Inf. Sci.) 53(3), 506–514 (2010)

    MathSciNet  Google Scholar 

  30. Dagadu, J.C., Li, J.-P., Aboagye, E.O.: Medical image encryption based on hybrid chaotic DNA diffusion. Wirel. Pers. Commun. 108(1), 591–612 (2019). https://doi.org/10.1007/s11277-019-06420-z

    Article  Google Scholar 

  31. Feng, W., He, Y.G.: Cryptanalysis and improvement of the hyper-chaotic image encryption scheme based on DNA encoding and scrambling. IEEE Photonics J. 10(6), 1–15 (2019)

    Article  MathSciNet  Google Scholar 

  32. Zhang, X., Wang, X.: Multiple image encryption algorithm based on DNA encoding and chaotic system. Multimed. Tools Appl. 78(6), 7841–7869 (2019)

    Article  Google Scholar 

  33. Fu, X.Q., Liu, B.C., Xie, Y.Y., et al.: Image encryption-then-transmission using DNA encryption algorithm and the double chaos. IEEE Photonics J. PP(99), 1–1 (2018)

    Google Scholar 

  34. Liu, P., Zhang, T., Li, X.: A new color image encryption algorithm based on DNA and spatial chaotic map. Multimed. Tools Appl. 78(11), 14823–14835 (2018). https://doi.org/10.1007/s11042-018-6758-y

    Article  Google Scholar 

Download references

Acknowledgments

The work is supported by the National Natural Science Foundation of China (Grant Nos. 61572446, 61602424, and U1804262).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yangyang Jiao or Guangzhao Cui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, J., Jiao, Y., Wang, Y., Li, H., Zhang, X., Cui, G. (2020). Research on the Application of DNA Cryptography in Electronic Bidding System. In: Pan, L., Liang, J., Qu, B. (eds) Bio-inspired Computing: Theories and Applications. BIC-TA 2019. Communications in Computer and Information Science, vol 1160. Springer, Singapore. https://doi.org/10.1007/978-981-15-3415-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-3415-7_18

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-3414-0

  • Online ISBN: 978-981-15-3415-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics