Secure blockchain bidding auction protocol against malicious adversaries  

在线阅读下载全文

作  者:Xiaobing Dai Jiajing Liu Xin Liu Xiaofen Tu Ruexue Wang 

机构地区:[1]Department of Computer and Information Engineering,Baotou Vocational&Technical College,Baotou 014010,China [2]Department of Computer,Tianjin Ren’ai College,Tianjin 301636,China [3]School of Information Engineering,Inner Mongolia University of Science and Technology,Baotou 014010,China

出  处:《High-Confidence Computing》2024年第3期58-63,共6页高置信计算(英文)

基  金:supported by Inner Mongolia Natural Science Foundation(2021MS06006);2023 Inner Mongolia Young Science and Technology Talents Support Project(NJYT23106);2022 Basic Scientific Research Project of Direct Universities of Inner Mongolia(2022-101);2022 Fund Project of Central Government Guiding Local Science and Technology Development(2022ZY0024);2022 Chinese Academy of Sciences“Western Light”Talent Training Program“Western Young Scholars”Project(22040601);Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2023-1-08);Inner Mongolia Discipline Inspection and Supervision Big Data Laboratory Open Project Fund(IMDBD202020);Baotou Kundulun District Science and Technology Plan Project(YF2020013);the 14th Five Year Plan of Education and Science of Inner Mongolia(NGJGH2021167);Inner Mongolia Science and Technology Major Project(2019ZD025);2022 Inner Mongolia Postgraduate Education and Teaching Reform Project(JGSZ2022037);Inner Mongolia Postgraduate Scientific Research Innovation Project(S20231164Z);Research and Application Project of Big Data Privacy Security Computing System(2023)。

摘  要:In recent years,with the development of blockchain,electronic bidding auction has received more and more attention.Aiming at the possible problems of privacy leakage in the current electronic bidding and auction,this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries,which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party.The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography.It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants,which can solve the problem of resisting malicious adversary attacks.The security of the protocol is proved by the real/ideal model paradigm,and the efficiency of the protocol is analyzed.The efficiency of the protocol is verified by simulating experiments,and the protocol has practical value.

关 键 词:Blockchain Secure multi-party computation Electronic bidding auction Malicious model Real/ideal model paradigm 

分 类 号:TP309[自动化与计算机技术—计算机系统结构] TP311.13[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象