Secure blockchain bidding auction protocol against malicious adversaries

Xiaobing Dai , Jiajing Liu , Xin Liu , Xiaofen Tu , Ruexue Wang

High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (3) : 100201

PDF (453KB)
High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (3) : 100201 DOI: 10.1016/j.hcc.2024.100201
Research Articles
research-article

Secure blockchain bidding auction protocol against malicious adversaries

Author information +
History +
PDF (453KB)

Abstract

In recent years, with the development of blockchain, electronic bidding auction has received more and more attention. Aiming at the possible problems of privacy leakage in the current electronic bidding and auction, this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries, which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party. The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography. It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants, which can solve the problem of resisting malicious adversary attacks. The security of the protocol is proved by the real/ideal model paradigm, and the efficiency of the protocol is analyzed. The efficiency of the protocol is verified by simulating experiments, and the protocol has practical value.

Keywords

Blockchain / Secure multi-party computation / Electronic bidding auction / Malicious model / Real/ideal model paradigm

Cite this article

Download citation ▾
Xiaobing Dai, Jiajing Liu, Xin Liu, Xiaofen Tu, Ruexue Wang. Secure blockchain bidding auction protocol against malicious adversaries. High-Confidence Computing, 2024, 4(3): 100201 DOI:10.1016/j.hcc.2024.100201

登录浏览全文

4963

注册一个新账户 忘记密码

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgments

This work was supported by Inner Mongolia Natural Science Foundation (2021MS06006), 2023 Inner Mongolia Young Science and Technology Talents Support Project (NJYT23106), 2022 Basic Scientific Research Project of Direct Universities of Inner Mongolia (2022-101), 2022 Fund Project of Central Government Guiding Local Science and Technology Development (2022ZY0024), 2022 Chinese Academy of Sciences "Western Light" Talent Training Program "Western Young Scholars" Project (22040601), Open Foundation of State key Laboratory of Networking and Switching Technology (Beijing University of Posts and Telecommunications) (SKLNST-2023-1-08), Inner Mongolia Discipline Inspection and Supervision Big Data Laboratory Open Project Fund (IMDBD202020), Baotou Kundulun District Science and Technology Plan Project (YF2020013), the 14th Five Year Plan of Education and Science of Inner Mongolia (NGJGH2021167), Inner Mongolia Science and Technology Major Project (2019ZD025), 2022 Inner Mongolia Postgraduate Education and Teaching Reform Project (JGSZ2022037), Inner Mongolia Postgraduate Scientific Research Innovation Project (S20231164Z), Research and Application Project of Big Data Privacy Security Computing System (2023).

References

[1]

T. Wongsamerchue, A. Leelasantitham, An electronic double auction of prepaid electricity trading using blockchain technology, J. Mobile Multimed. (2022) 1829-1850.

[2]

R.T. Elias, A.H. AL-Wattar, Design and implementation of online auction system, NTU J. Pure Sci. 1 (2) (2022) 29-38.

[3]

Q. Fan, D. Zheng, R. Guo, et al., Certificateless blind aggregation signature scheme in the blockchain electronic auction, in: 2022 4th International Conference on Natural Language Processing, ICNLP, IEEE, 2022, pp. 444-451.

[4]

B. Chen, X. Li, T. Xiang, et al., SBRAC:Blockchain-based sealed-bid auction with bidding price privacy and public verifiability, J. Inf. Secur. Appl. 65 (2022) 103082.

[5]

Y. Chen, H. Li, N. Ren, A review of auction fever in auction theory, J. Educ., Humanit. Soc. Sci. 2 (2022) 130-136.

[6]

X. Xu, W. Liu, Y. Zhang, et al., Psdf: Privacy-aware iov service deployment with federated learning in cloud-edge computing, ACM Trans. Intell. Syst. Technol. 13 (5) (2022) 1-22.

[7]

Q. Gu, Z. Xia, X. Sun, MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing, Future Gener. Comput. Syst. 134 (2022) 78-92.

[8]

A.C. Yao, Protocols for secure computations, in: 23rd Annual Symposium on Foundations of Computer Science, sfcs 1982, IEEE, 1982, pp. 160-164.

[9]

Y. Wu, X. Wang, W. Susilo, et al., Generic server-aided secure multi-party computation in cloud computing, Comput. Stand. Interfaces 79 (2022) 103552.

[10]

T. Veugen, Secure multi-party computation and its applications, in: International Conference on Innovations for Community Services, Springer, Cham, 2022, pp. 3-5.

[11]

K. Miyachi, T.K. Mackey, HOCBS:A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design, Inf. Process. Manage. 58 (3) (2021) 102535.

[12]

H. Yang, J. Shen, J. Lu, et al., A privacy-preserving data transmission scheme based on oblivious transfer and blockchain technology in the smart healthcare, Secur. Commun. Netw. 2021 (2021) 1-12.

[13]

C. Hu, Z. Liu, R. Li, et al., Smart contract assisted privacy-preserving data aggregation and management scheme for smart grid, IEEE Trans. Dependable Secure Comput. (2023).

[14]

X. Xiao, Y. Zhang, Y. Zhu, et al., FingerChain: Copyrighted multi-owner media sharing by introducing asymmetric fingerprinting into blockchain, IEEE Trans. Netw. Serv. Manag. (2023).

[15]

J. Song, T. Gu, Z. Fang, et al., Blockchain meets COVID-19: A framework for contact information sharing and risk notification system, in: 2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, MASS, IEEE, 2021, pp. 269-277.

[16]

Shi Runhua, Liang Fengyu, Wang Qing, et al., An effective quantum sealed-bid auction protocol, Netinfo Secur. 19 (8) (2019) 44-50.

[17]

G. Maxwell, A. Poelstra, Y. Seurin, et al., Simple schnorr multi-signatures with applications to bitcoin, Des. Codes Cryptogr. 87 (9) (2019) 2139-2164.

[18]

Wang Xiaoli, Li Xiaoyu, Anonymous electronic auction protocol using anonymous communication, Miniature Comput. Syst. 41 (01) (2020) 85-91.

[19]

Li Bei, Zhang Wenyin, Wang Jiuru, et al., Blockchain-based sealed bidding auction scheme, Comput. Appl. 41 (4) (2021) 999-1004.

[20]

A. Shamir, How to share a secret, Commun. ACM 22 (11) (1979) 612-613.

[21]

D. Johnson, A. Menezes, S. Vanstone, The elliptic curve digital signature algorithm (ECDSA), Int. J. Inf. Secur. 1 (1) (2001) 36-63.

[22]

M.J. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Trans. Inf. Theory 36 (3) (1990) 553-558.

[23]

T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inf. Theory 31 (4) (1985) 469-472.

[24]

Pierre Alain Fouque, Guillaume Poupard, Jacques Stern, Sharing decryption in the context of voting or lotteries, in:Financial Cryptography: 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000.

[25]

O. Goldreich, Foundations of Cryptography, Volume 2[M], Cambridge University Press, Cambridge, 2004.

[26]

Li Shundong, Xu Wenting, Wang Wenli, Zhang Mengyu, Maximum (minimum) value security calculation under malicious model, J. Comput. Sci. 44 (10) (2021) 14.

AI Summary AI Mindmap
PDF (453KB)

241

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/