检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Xiaobing Dai Jiajing Liu Xin Liu Xiaofen Tu Ruexue Wang
机构地区:[1]Department of Computer and Information Engineering,Baotou Vocational&Technical College,Baotou 014010,China [2]Department of Computer,Tianjin Ren’ai College,Tianjin 301636,China [3]School of Information Engineering,Inner Mongolia University of Science and Technology,Baotou 014010,China
出 处:《High-Confidence Computing》2024年第3期58-63,共6页高置信计算(英文)
基 金:supported by Inner Mongolia Natural Science Foundation(2021MS06006);2023 Inner Mongolia Young Science and Technology Talents Support Project(NJYT23106);2022 Basic Scientific Research Project of Direct Universities of Inner Mongolia(2022-101);2022 Fund Project of Central Government Guiding Local Science and Technology Development(2022ZY0024);2022 Chinese Academy of Sciences“Western Light”Talent Training Program“Western Young Scholars”Project(22040601);Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2023-1-08);Inner Mongolia Discipline Inspection and Supervision Big Data Laboratory Open Project Fund(IMDBD202020);Baotou Kundulun District Science and Technology Plan Project(YF2020013);the 14th Five Year Plan of Education and Science of Inner Mongolia(NGJGH2021167);Inner Mongolia Science and Technology Major Project(2019ZD025);2022 Inner Mongolia Postgraduate Education and Teaching Reform Project(JGSZ2022037);Inner Mongolia Postgraduate Scientific Research Innovation Project(S20231164Z);Research and Application Project of Big Data Privacy Security Computing System(2023)。
摘 要:In recent years,with the development of blockchain,electronic bidding auction has received more and more attention.Aiming at the possible problems of privacy leakage in the current electronic bidding and auction,this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries,which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party.The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography.It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants,which can solve the problem of resisting malicious adversary attacks.The security of the protocol is proved by the real/ideal model paradigm,and the efficiency of the protocol is analyzed.The efficiency of the protocol is verified by simulating experiments,and the protocol has practical value.
关 键 词:Blockchain Secure multi-party computation Electronic bidding auction Malicious model Real/ideal model paradigm
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7