Loading

Modified Group Signature in Online Auction System
Aayush Agarwal1, Rekha Saraswat2
1Aayush Agarwal, Information Technology, CDAC, Noida, India.
2Rekha Saraswat, Computer Applications, CDAC, Noida, India.
Manuscript received on March 12, 2013. | Revised Manuscript received on April 13, 2013. | Manuscript published on April 30, 2013. | PP: 310-313 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1444042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Group Signature scheme allows members of a group to sign messages on behalf of the group, such that the resulting signature does not reveal the identity of the signer. Signatures can be verified with respect to a single group public key. In case of dispute, only a designated group manager, because of their special property, is able to open signatures, and thus reveal the signer’s identity. Its applications are widespread used, especially in e-commerce such as e-cash, e-voting and e-auction. On the other hand, Internet is an open environment, and the unsecured environment can obstruct the development of e-commerce. Therefore, Internet must have some protocol to prevent the important message from impersonating and modifying. Recently, online auction has been receiving more and more attention in the world of electronic commerce, hence, the security and efficiency of online auction is more and more important. This paper proposes a new scheme for conducting secure and anonymous online auctions using a modified type of group signature. Our scheme solves the problems of the existing auction schemes and has following characteristics: unforgeability, anonymity, unlinkability, exculpability, coalition-resistance, verifiability, robustness, traceability, revocation, one-off registration, unskewability and unblockability. Our scheme has comparable efficiency to the existing schemes for the enhanced security and privacy it provides.
Keywords: Anonymity, Authenticated encryption, E-auction, group signature.