2013
DOI: 10.1002/dac.2571
|View full text |Cite
|
Sign up to set email alerts
|

A provable secure sealed‐bid multi‐attribute auction scheme under semi‐honest model

Abstract: SUMMARYSecure electronic auction protocol attracts increasing attention in the field of information security research. A variety of secure electronic auction protocols have achieved a lot. However, those studies mainly focus on price‐based auction model. There are few literatures involving security issues of multi‐attribute e‐auction. In recent years, the existing literatures mainly focus on the winner determination problem of multi‐attribute auction, but research of multi‐attribute e‐auction just begin from t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 38 publications
0
6
0
Order By: Relevance
“…In 2014, Shi [4] utilized the private set intersection proposed by Freedman et al [17] and Paillier's [18] encryption system to protect the privacy of bids. Unfortunately, we should point out that buyers can do illegal things that are contrary to fairness in Shi's proposal.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…In 2014, Shi [4] utilized the private set intersection proposed by Freedman et al [17] and Paillier's [18] encryption system to protect the privacy of bids. Unfortunately, we should point out that buyers can do illegal things that are contrary to fairness in Shi's proposal.…”
Section: Related Workmentioning
confidence: 99%
“…Our protocol focuses on the reverse auction, and it was designed based on one buyer and n sellers. In addition, if desired, it can be extended easily to the double auction like Shi's auction protocol [4].…”
Section: Adversary Modelmentioning
confidence: 99%
See 3 more Smart Citations