Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2000, International Conference on Information Systems
Enhancing e-commerce security through computing technology alone is not sufficient. E-commerce designers should apply economic mechanisms to design proper digital processes that accommodate new perspectives raised in e-commerce. For instance, traditional auction mechanisms, such as the Generalized Vickrey Auction, are vulnerable to false-name bidding, an online fraud exploiting the lack of authentication over the Internet. We develop a Sealed-bid Multi-round Auction Protocol (S-MAP), which sells multi-unit identical goods. S-MAP is not only robust against false-name bidding but also simple and efficient.
1999
Electronic Commerce (EC) has rapidly grown with the expansion of the Internet. Among these activities, auctions have recently achieved huge popularity, and have become a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an infrastructure for much cheaper auctioning with many more sellers and buyers, we must consider the possibility of a new type of cheating, i.e., an agent tries to get some profit by submitting several bids under fictitious names (false-name bids). Although false-name bids are easier to execute than forming collusion, the vulnerability of auction protocols to false-name bids has not been discussed before. In this paper, we examine the robustness of the generalized Vickrey auction (G.V.A.) against false-name bids. The G.V.A. has the best theoretical background among various auction mechanisms, i.e., it has proved to be incentive compatible and be able to achieve a Pareto efficient allocation. We show that false-name bids may be effective, i.e., the G.V.A. loses incentive compatibility under the possibility of false-name bids, when the marginal utility of an item increases or goods are complementary. Moreover, we prove that there exists no single-round sealed-bid auction protocol that simultaneously satisfies individual rationality, Pareto efficiency, and incentive compatibility in all cases if agents can submit false-name bids.
Artificial Intelligence, 2001
This paper presents a method for designing bundles in a combinatorial auction protocol that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying AI technologies. However, the possibility of a new type of cheating called a false-name bid, i.e., a bid submitted under a fictitious name, has been pointed out. A protocol called Leveled Division Set (LDS) protocol that is robust against false-name bids has been developed. However, this protocol requires the auctioneer to define a leveled division set. A leveled division set is a series of division sets, where a division set is a set of divisions and a division is a combination of bundles of goods. We need to solve a very complicated optimization problem to construct a leveled division set in order to obtain a good social surplus. We have developed a heuristic method for overcoming this problem. In this method, we first find a good division with a winner determination algorithm, and then construct a leveled division set by using this division as a seed. Through a simulation, we show that our method can obtain a social surplus that is very close to optimal.
International Conference on Security and Cryptography (SECRYPT'06), 2006
Online auctions are a popular means for exchanging items over the Internet. However, are many inherent security and fairness concerns. Participants can behave in an undesirable and fraudulent manner in an attempt to gain an advantage at the expense of rivals. For example, a bidder might seek to suppress the price by bid sniping, or the seller could introduce fake bids to inflate the price. In addition, an outsider or rival seller can lure away bidders by directly offering them better deals, or a malicious seller can auction mis-represented or non-existent items. This conduct is a problem as it results in market failure, thereby inhibiting the usefulness of online auctions as an exchange medium. While cryptography has been used to provide security in terms of bid authentication and privacy, there is no documented means to prevent many of the aforementioned problems. This paper investigates undesirable and fraudulent behaviour in online auctions. We examine the following practices: bid shielding, shill bidding, bid sniping, siphoning and selling non-existent or misrepresented items. We describe the characteristics of such behaviour and how to identify it in an auction. We also provide recommendations for recourse against undesirable and fraudulent participants.
Games and Economic Behavior, 2002
We examine the effect of false-name bids on combinatorial auction protocols. False-name bids are bids submitted by a single bidder using multiple identifiers such as multiple e-mail addresses. The obtained results are summarized as follows: (1) the Vickrey-Clarke-Groves (VCG) mechanism, which is strategy-proof and Pareto efficient when there exists no false-name bid, is not falsename-proof; (2) there exists no false-name-proof combinatorial auction protocol that satisfies Pareto efficiency; (3) one sufficient condition where the VCG mechanism is false-name-proof is identified, i.e., the concavity of a surplus function over bidders.
The use of electronic online auctions has increased and this kind of mechanism has been widely used by organizations and individuals around the world. Many models have been proposed to make this kind of business model trustworthy. It is proposed in this paper a flexible, fraud resistant, infrastructure to allow the set up of distributed online auctions. The concept developed here has strong process directions, in contrast to traditional cryptographic or hardware approaches. The proposed system is composed of functional modules that provide evidences of the activities carried out by bidders and auctioneers making the detection of misuse possible. The infrastructure that collects evidences about the user behavior can also be used in the future to profile bidders in order to detect frauds.
IASK International Conference E-Activity and Leading Technologies, 2008
Online auctions are inherently insecure and there exist many opportunities for participants to cheat. Cryptographic protocols can be applied to help alleviate some of these problems. However, different auction types have differing security requirements. This makes it difficult to construct schemes to prevent all possible forms of dubious behaviour. This paper presents a survey of cryptographic schemes that have been proposed for conducting private and secure auctions. The major auction types are investigated and their privacy and security requirements contrasted. We provide a uniform analysis of each auction scheme's functional components and analyse the efficiency of the security mechanisms. The paper's motivation is to give an all-encompassing overview of auction privacy and security, which has not been documented elsewhere. This paper supports supplementary research by the author into online auction fraud and security issues. We show that most schemes are currently not practical and there are conflicting perspectives regarding security requirements. Avenues for future research are proposed with regard to the present lacking state of commercial online auction security.
2nd International Conference on E-Business and Telecommunication Networks (ICETE'05), 2005
Extensive research has been conducted in order to improve the security and efficiency of electronic auctions. However, little attention has been paid to the design issues. This paper discusses design issues and contrasts the differing security requirements between various auction types. We demonstrate that poor design for an electronic auction breaches the security of the system and degrades its practicality, irrespective of how secure/efficient the building blocks of an electronic auction are. This is accomplished by illustrating design flaws in several existing electronic auction schemes. Furthermore, we provide a solution to these flaws using a group signature scheme and give recommendations for sound auction design.
ACM Crossroads, 2005
In this article we describe two popular types of electronic auctions. We discuss the security issues associated with conducting these auctions and contrast the differing anonymity requirements.We also identify four main strategies for reducing the trust that bidders must place in the auctioneer.Furthermore, we present a basic example of an electronic auction scheme.This is used to illustrate the complexity involved in designing a secure and anonymous auction scheme.Finally, we discuss some of our research with regard to using group signature schemes to constructelectronic auctions.
2007
Firstly, I would like to thank Wayne Read for his supervision throughout this thesis.
2004
In this paper we present a cryptographic protocol which is the realization of an electronic auction being the component of the e-government system. This cryptographic protocol fulfils all the functions of the classic auction and additionally, by use of cryptographic primitives, enhances the protection of information. The characteristic features of the protocol are: the incontrovertibility of participants and offers, data integrity, confidence of bids, anonymity of the winning bidder, public verification of the result of auction and confirmation of taking part in the auction. 1.
2009
The auction scheme that provides receipt-freeness, prevents the bidders from bid-rigging by the coercers. Bid-rigging is a dangerous attack in electronic auction. This happen if the bidder gets a receipt of his bidding price, which proves his bidding prices, from the auction protocol. The coercers used to force the bidders to disclose their receipts and hence bidders lose the secrecy of their bidding prices. This paper presents a protocol for a receipt-free, sealed-bid auction. The scheme ensures the receipt-freeness, secrecy of the bid, secrecy of the bidder and public verifiability.
OnlineAuctionSystemUsingBlockchain, 2023
The growth of electronic communication has resulted in the rapid increase of several online applications, including the highly appreciated E-Auction System that enables bidders and sellers to interact through a virtual platform. Unlike traditional auctions, this online mode eliminates geographical limitations, timing constraints, and limited participation. Additionally, the integration of Blockchain and smart contract technology ensures high security, including secure payment gateways, making the system fully protected. The auction application developed using Flutter is a mobile platform that facilitates online auctions, providing users with a convenient and efficient way to bid on items from anywhere, at any time. This application provides users with a seamless and intuitive interface, allowing them to browse through a vast collection of items, place bids, and track their bidding history. The application incorporates robust security measures to ensure secure transactions, and the bidding process is transparent and fair to all participants. By using Flutter’s powerful framework, the application delivers a smooth and responsive user experience, making it an excellent platform for buying and selling goods through online auctions.This model aims to enable everyone to host their auctions or participate in auctions from anywhere globally. As technology continues to evolve, people must also adapt accordingly.The use of blockchain technology provides immutability and tamper-proof records, enhancing trust between buyers and sellers.The proposed system aims to provide a secure and transparent platform for conducting auctions, utilizing smart contracts to automate the bidding process and ensure fairness.The system utilizes a decentralized architecture, with the blockchain acting as a distributed ledger to record all transactional data, including bids, auction details, and payment information. Smart contracts are used to automate the bidding process, ensuring that all bids are processed fairly and efficiently. The system also incorporates a reputation system to provide additional trust and transparency, enabling buyers and sellers to rate each other based on their transactional history. Overall, the proposed system demonstrates the potential of blockchain for creating secure and transparent online auction platforms.
Periodica Mathematica Hungarica, 2012
Sealed bid auctions are a popular means of high-stakes bidding, as they eliminate the temporal element from the auction process, allowing participants to take less emotional, more thoughtful decisions. In this paper, we propose a digital communication protocol for conducting sealed bid auctions with high stakes, where the anonymity of bids as well as other aspects of fairness must be protected. The Dining Cryptographers' Protocol (denoted by DC) was presented by David Chaum in 1988. The protocol allows the participants to broadcast a message anonymously. In a recent paper (Another Twist in the Dining Cryptographers' Protocol, submitted to Journal of Cryptology) the authors propose a variant of the original DC eliminating its main disadvantages. In this paper we present a cryptographic protocol realizing anonymous sealed bid auctions, such as first price or Vickrey auction, based on this variant. The proposed scheme allows to identify at least one dishonest participants violating the protocol without the using of Trusted Third Parties. Additionally, we require that bids are binding. It is achieved by enabling all participants acting in concert (the so-called "angry mob") to find out the identity of the winner, in case the winner fails to make the purchase. * This research was partially supported by the Momentum (Lendület) fund of the Hungarian Academy of Sciences and the European Union and the European Social Fund have provided financial support to the project under the grant agreement no. TÁMOP 4.2.1/B-09/1/KMR-2010-0003.
International Journal of Computer (IJC), 2022
The advance and secure online auctioning system is a versatile approach for facilitating lot-based online auctioning system. In this paper, we will describe how to build a safe and online advance auction website. The system has been built to be extremely scalable and capable of serving huge groups of bidders in a promotional event. You may browse deals and put bids on a secure server using the online auction system. The service provider is responsible for all shipping costs. The goal is to create a user-friendly auctioning platform where any goods may be auctioned and where bidders and sellers can receive value-added services. The items will be verified, and the site will provide a secure and safe experience for online users. Auction system is further divide into two different easy platforms in which one is special designed for only the developers to maintain and update the system according the current requirements and demands while another is specific for user-end platform. It is very efficient, secure and reliable for all types of bidders, buyer and sellers. Because of its reliability, efficiency and secure platform, it is not wrong to say that this auction system is unique and can differs from all other system which are also developed and designed for the purpose of auctioning.
IET Information Security, 2010
The rapid development in electronic commerce and information technology drives the traditional physical product trading evolved to digital product trading. With the effect of the multi-agents system in the Internet environment and the promotions of Government, digital product industry grows fast. The authors proposed a digital product transaction mechanism for electronic auction in the multi-agents system environment. The research introduced a convenient platform to protect the privacies of both buyers and sellers, and track digital product further in an electronic auction environment. In addition, by using simple cryptography techniques supplemented with encryption, the authors ensure the security of information transactions, thereby providing a mechanism of safe and fair digital product electronic auction. In order to provide a dependable trust, security and privacy environment for e-commerce, some proper security issues are 248
Information and Communications Security, 2002
The sealed bid model of auctions is ideally suited for electronic auction systems, as they avoid the requirement for real-time communications between various entities. A sealed bid auction scheme designed by Kikuchi, Harkavy and Tygar is analysed. Several shortcomings are identified in this scheme including the lack of public verifiability and the possibility of collusion between bidders and/or auctioneers. A new scheme is designed to overcome these shortcomings.
Semantic Issues in E-Commerce Systems, 2003
With the emergence of business to business eCommerce conventional trading practices need to be adapted to the new electronic environment. One such trading practice is the call for tender (CFT) which is heavily used for trading perishable goods. A naive translation of the CFT to mediated eCommerce introduces new manipulation possibilities like identity masquerading, repudiation of messages etc. In a first step, we show how the basic CFT can be made robust against these classical security attacks. However, this approach does not eliminate fundamental economic design problems of the CFT itself. In a second step, we show how the CFT can be protected against manipulations that damage the fairness and economic efficiency of a market by turning it into a secure sealed-bid auction protocol.
International Journal of Computer Applications, 2013
This paper provides a robust method for solving the question of security and privacy of online sealed bid auction. The Internet is now playing an important role in changing how we interact with other people and how we do business today. As a result of the internet, Electronic commerce allows business to more effectively interact with their customers. The challenges that oppose electronic communication are concern of security and privacy of information. This paper will first discuss online sealed bid auction. Secondly it will talk about the concerns about security and privacy issue.
Network Security, 2009
Privacy and anonymity have become two factors of increasing importance in auction protocol. This paper provides an efficient sealed-bid electronic auction protocol based on the technique of ring signature and verifiable technique of encryption key chain. The peculiar characteristics of our protocol are non-repudiation of bidders but preserving their anonymity and allowing the auctioneer to determine the wining bid without revealing the losing bid. Our protocol has additional characteristics such as public verifiability, unforgeability, correctness and fairness.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.