메뉴 건너뛰기




Volumn 1751, Issue , 2000, Pages 422-432

An auction protocol which hides bids of losers

Author keywords

Auction; Group decryption; Privacy

Indexed keywords

CHROMIUM COMPOUNDS; DATA PRIVACY;

EID: 35248870807     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-46588-1_28     Document Type: Conference Paper
Times cited : (104)

References (15)
  • 5
    • 0001710760 scopus 로고    scopus 로고
    • [] Matthew Franklin and Michael Reiter. The design and implementation of a secure auction service. In IEEE Transactions on Software Engineering, No.22, Vol.5, pages 302-312, 1996.
    • Franklin, M.1    Reiter, M.2
  • 6
    • 84957823005 scopus 로고    scopus 로고
    • [] Rosario Gennaro, Shai Halevi and Tal Rabin. Secure hash-and-sign signatures without the random oracle. In Eurocrypt99, 1999.
    • Gennaro, R.1    Halevi, S.2    Rabin, T.3
  • 7
    • 85094835061 scopus 로고    scopus 로고
    • [] Michael Harkavy, Doug Tyger, Hiroaki Kikuchi. Electronic auctions with private bids. In Third USENIX Workshop on Electronic Commerce, 1998.
    • Harkavy, M.1    Tyger, D.2    Kikuchi, H.3
  • 9
    • 84957823008 scopus 로고    scopus 로고
    • [] Kunio Kobayashi and Hikaru Morita. Efficient sealed-bid auction with quantitative competition using one-way functions. In Technical Report of IEICE, ISECMay 1999.
    • Kobayashi, K.1    Morita, H.2
  • 10
    • 84957823009 scopus 로고    scopus 로고
    • [] M. Michels and M. Stadler. Efficient convertible undeniable signature schemes. In Proc. 4th Annual Workshop on Selected Areas in Cryptograph, SAC'97, 1997.
    • Michels, M.1    Stadler, M.2
  • 11
    • 84957823010 scopus 로고    scopus 로고
    • [] Shingo Miyazaki and Kouichi Sakurai. Notes on threshold schemes in the distributed RSA Cryptosystem. In the 1999 Symposium on Cryptography and Information Security, pp.451-456, 1998.
    • Miyazaki, S.1    Sakurai, K.2
  • 12
    • 85030460443 scopus 로고
    • InAdvances in Cryptology — EUROCRYPT '91, Lecture Notes in Computer Science
    • Ped91[] Torben P. Pedersen. A threshold cryptosystem without a trusted party (extended abstract). In Advances in Cryptology — EUROCRYPT '91, volume 547 of Lecture Notes in Computer Science, pages 522-526, 1991.
    • (1991) A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , vol.547 , pp. 522-526
    • Pedersen, T.P.1
  • 14
    • 84957823011 scopus 로고    scopus 로고
    • [] Kouichi Sakurai and Shingo Miyazaki. A bulletin-board based digital auction scheme with bidding down strategy -towards anonymous electronic bidding without anonymous channels nor trusted centersin Cryptographic Techniques and E-Commerce, Proceedings of the 1999 International Workshop on Cryptographic Techniques and E-Commerce(CryTEC '99)1999.
    • Sakurai, K.1    Miyazaki, S.2
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • Sha79[] Adi Shamir. How to share a secret. Communications of the ACM, 22:612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.