A secure e-auction scheme based on group signatures
- 20 May 2008
- journal article
- Published by Springer Science and Business Media LLC in Information Systems Frontiers
- Vol. 11 (3), 335-343
- https://doi.org/10.1007/s10796-008-9094-3
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Efficient anonymous auction protocols with freewheeling bidsComputers & Security, 2003
- Adding timestamps to the secure electronic auction protocolData & Knowledge Engineering, 2002
- Deniable authentication protocol based on Deffie-Hellman algorithmElectronics Letters, 2002
- A Practical English Auction with One-Time RegistrationLecture Notes in Computer Science, 2001
- An Online Public Auction Protocol Protecting Bidder PrivacyLecture Notes in Computer Science, 2000
- The design and implementation of a secure auction serviceIEEE Transactions on Software Engineering, 1996
- Authenticated encryption scheme without using a one way functionElectronics Letters, 1995
- Group SignaturesLecture Notes in Computer Science, 1991
- Verifiable secret sharing and multiparty protocols with honest majorityPublished by Association for Computing Machinery (ACM) ,1989
- How to share a secretCommunications of the ACM, 1979