A robust double auction protocol based on a hybrid trust model

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, Wang and Leung proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive in computation and are not robust in dealing with system malfunction or user misbehavior. In this paper, we propose a secure and practical double auction protocol based on a hybrid trust model, where computation load is distributed to buyers and sellers while a semi-trusted manager handles the registration phase. A prominent feature of the proposed protocol is its high robustness, achieved by using a publicly verifiable secret sharing scheme with threshold access structure. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Ha, J. H., Zhou, J., & Moon, S. J. (2005). A robust double auction protocol based on a hybrid trust model. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3803 LNCS, pp. 77–90). https://doi.org/10.1007/11593980_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free