The Ethereum block chain as a decentralized platform is so successful that many applications deployed on
it. However, for the inherent transparency properties and the lack of privacy, deploying a financial
application on top of it is always a challenge. In this paper, we tackle this challenge and propose an
anonymous sealed-bid auction protocol based on time-released encryption atop Consortium Block chain.
We adopt a strict digital certificate-based identity mechanism of the consortium block chain to permit
legitimate participants, and utilize the blind signature based on elliptic curve technology to allowing
anonymous participation.
ANONYMOUS AUCTION PROTOCOL BASED ON TIME-RELEASED ENCRYPTION ATOP CONSORTIUM ...ijait
The Ethereum block chain as a decentralized platform is so successful that many applications deployed on it. However, for the inherent transparency properties and the lack of privacy, deploying a financial application on top of it is always a challenge. In this paper, we tackle this challenge and propose an anonymous sealed-bid auction protocol based on time-released encryption atop Consortium Block chain. We adopt a strict digital certificate-based identity mechanism of the consortium block chain to permit legitimate participants, and utilize the blind signature based on elliptic curve technology to allowing anonymous participation. Moreover, a timed release public key encryption algorithm is adopted to encrypt bids and prevent auctioneer from colluding with bidders. This is completely different from the method (zero-knowledge proof) used in other papers to prevent collusion between auctioneer and bidder. We provide a specific analysis of our protocol, which shows that our protocol meets anonymity and applicability.
The document provides an overview of Secure Sockets Layer (SSL) and how it works. It discusses how SSL uses cryptography, digital signatures, and certificates to provide security for web traffic by ensuring confidentiality, message integrity, and authentication. It describes how SSL operates through the handshake protocol to negotiate encryption between clients and servers and the record protocol to encrypt data transfer. SSL termination devices are deployed to offload SSL processing from web servers and improve performance and scalability.
The document describes privacy-preserving protocols for multi-unit auctions that allow bidders to jointly compute the auction outcome without revealing private information to each other or a third party. It proposes protocols for three common types of multi-unit auctions (uniform-price, discriminatory, and generalized Vickrey auctions) that assume bidders have marginal decreasing valuations. The protocols are based on distributed homomorphic encryption and require a small constant number of rounds. They aim to enable privacy, correctness of outcomes, and minimize interaction between bidders.
ABCrowd: An Auction Mechanism on Blockchain for Spatial CrowdsourcingMaha Kadadha
R-SMB is an auction mechanism proposed for spatial crowdsourcing on blockchain. It addresses the challenges of centralized platforms by running the crowdsourcing platform entirely on Ethereum blockchain using smart contracts. This guarantees trusted execution and transparency. R-SMB is based on repeating the Single-Minded Bidder auction multiple times to allocate tasks to workers in order to maximize allocation given crowdsourcing requirements. It provides truthfulness incentives for workers while approximating the optimized social welfare of the Vickrey-Clarke-Groves mechanism. The R-SMB mechanism is implemented on blockchain and shown to have comparable performance to VCG with improved results for workers and requesters, while having lower execution costs.
DESIGN AND EVALUATION OF A NEW FAIR EXCHANGE PROTOCOL BASED ON AN ONLINE TTP IJNSA Journal
Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and secured; they should protect both parties from fraudulent users and subsequently promote the growth of e-commerce. There are some protocols, known as fair exchange protocols, in e-commerce that are designed to guarantee fairness between the customer and the merchant so that neither party gains any advantage over the other. Therefore, in this paper, we introduce a new fair exchange protocol for trading products online between a buyer and a seller. The items to be exchanged in this protocol are a digital product and a payment. The following are the characteristics of this new protocol: (1) Dependency on a trusted third party is greatly reduced; further, the protocol also overcomes increased communication overheads and risks, hence leading to substantial improvement in the efficiency and practicality of the protocol. (2) The
protocol ensures fairness for all parties and provides an internal dispute resolution mechanism, thereby guaranteeing that none of the parties involved in the transaction suffer unfairly in case one of the entities disappears before the transaction is formalized. (3) The protocol consists of three messages exchanged between the buyer (customer) and the seller (merchant).
Decrypting Insurance Broking through BlockchainCognizant
Blockchain technology could help brokers maximize their operational efficiencies by using smart contracts to automate key processes, freeing them to focus on value-added services that drive customer loyalty.
A Fair Exchange & Customer Anonymity Protocol Using A Trusted Third Party for...IJNSA Journal
The rapid development of technology and the reach of such technologies at affordable costs has made it possible for all people across the world to make purchases at a click of the mouse and at their convenience.Electronic commerce technologies and protocols facilitate the processing of online transactions. Trust plays a major role in e-commerce transactions and various protocols help establishing this trust by providing fair exchange and anonymity.
The research aims at designing and developing a protocol that provides both fair exchange and anonymity, thus avoiding the need to have manual dispute resolution. It takes into account the technical flaws researched and overcomes those by implementing methods to ensure that confidentiality and integrity of the messages are maintained by making sure that the Trusted Third Party does not have the authority to view or modify the messages but can only verify the authenticity of the other two parties.
A fair exchange & customer anonymity protocolIJNSA Journal
The rapid development of technology and the reach of such technologies at affordable costs has made it
possible for all people across the world to make purchases at a click of the mouse and at their
convenience.Electronic commerce technologies and protocols facilitate the processing of online
transactions. Trust plays a major role in e-commerce transactions and various protocols help establishing
this trust by providing fair exchange and anonymity.
The research aims at designing and developing a protocol that provides both fair exchange and anonymity,
thus avoiding the need to have manual dispute resolution. It takes into account the technical flaws
researched and overcomes those by implementing methods to ensure that confidentiality and integrity of the
messages are maintained by making sure that the Trusted Third Party does not have the authority to view
or modify the messages but can only verify the authenticity of the other two parties.
ANONYMOUS AUCTION PROTOCOL BASED ON TIME-RELEASED ENCRYPTION ATOP CONSORTIUM ...ijait
The Ethereum block chain as a decentralized platform is so successful that many applications deployed on it. However, for the inherent transparency properties and the lack of privacy, deploying a financial application on top of it is always a challenge. In this paper, we tackle this challenge and propose an anonymous sealed-bid auction protocol based on time-released encryption atop Consortium Block chain. We adopt a strict digital certificate-based identity mechanism of the consortium block chain to permit legitimate participants, and utilize the blind signature based on elliptic curve technology to allowing anonymous participation. Moreover, a timed release public key encryption algorithm is adopted to encrypt bids and prevent auctioneer from colluding with bidders. This is completely different from the method (zero-knowledge proof) used in other papers to prevent collusion between auctioneer and bidder. We provide a specific analysis of our protocol, which shows that our protocol meets anonymity and applicability.
The document provides an overview of Secure Sockets Layer (SSL) and how it works. It discusses how SSL uses cryptography, digital signatures, and certificates to provide security for web traffic by ensuring confidentiality, message integrity, and authentication. It describes how SSL operates through the handshake protocol to negotiate encryption between clients and servers and the record protocol to encrypt data transfer. SSL termination devices are deployed to offload SSL processing from web servers and improve performance and scalability.
The document describes privacy-preserving protocols for multi-unit auctions that allow bidders to jointly compute the auction outcome without revealing private information to each other or a third party. It proposes protocols for three common types of multi-unit auctions (uniform-price, discriminatory, and generalized Vickrey auctions) that assume bidders have marginal decreasing valuations. The protocols are based on distributed homomorphic encryption and require a small constant number of rounds. They aim to enable privacy, correctness of outcomes, and minimize interaction between bidders.
ABCrowd: An Auction Mechanism on Blockchain for Spatial CrowdsourcingMaha Kadadha
R-SMB is an auction mechanism proposed for spatial crowdsourcing on blockchain. It addresses the challenges of centralized platforms by running the crowdsourcing platform entirely on Ethereum blockchain using smart contracts. This guarantees trusted execution and transparency. R-SMB is based on repeating the Single-Minded Bidder auction multiple times to allocate tasks to workers in order to maximize allocation given crowdsourcing requirements. It provides truthfulness incentives for workers while approximating the optimized social welfare of the Vickrey-Clarke-Groves mechanism. The R-SMB mechanism is implemented on blockchain and shown to have comparable performance to VCG with improved results for workers and requesters, while having lower execution costs.
DESIGN AND EVALUATION OF A NEW FAIR EXCHANGE PROTOCOL BASED ON AN ONLINE TTP IJNSA Journal
Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and secured; they should protect both parties from fraudulent users and subsequently promote the growth of e-commerce. There are some protocols, known as fair exchange protocols, in e-commerce that are designed to guarantee fairness between the customer and the merchant so that neither party gains any advantage over the other. Therefore, in this paper, we introduce a new fair exchange protocol for trading products online between a buyer and a seller. The items to be exchanged in this protocol are a digital product and a payment. The following are the characteristics of this new protocol: (1) Dependency on a trusted third party is greatly reduced; further, the protocol also overcomes increased communication overheads and risks, hence leading to substantial improvement in the efficiency and practicality of the protocol. (2) The
protocol ensures fairness for all parties and provides an internal dispute resolution mechanism, thereby guaranteeing that none of the parties involved in the transaction suffer unfairly in case one of the entities disappears before the transaction is formalized. (3) The protocol consists of three messages exchanged between the buyer (customer) and the seller (merchant).
Decrypting Insurance Broking through BlockchainCognizant
Blockchain technology could help brokers maximize their operational efficiencies by using smart contracts to automate key processes, freeing them to focus on value-added services that drive customer loyalty.
A Fair Exchange & Customer Anonymity Protocol Using A Trusted Third Party for...IJNSA Journal
The rapid development of technology and the reach of such technologies at affordable costs has made it possible for all people across the world to make purchases at a click of the mouse and at their convenience.Electronic commerce technologies and protocols facilitate the processing of online transactions. Trust plays a major role in e-commerce transactions and various protocols help establishing this trust by providing fair exchange and anonymity.
The research aims at designing and developing a protocol that provides both fair exchange and anonymity, thus avoiding the need to have manual dispute resolution. It takes into account the technical flaws researched and overcomes those by implementing methods to ensure that confidentiality and integrity of the messages are maintained by making sure that the Trusted Third Party does not have the authority to view or modify the messages but can only verify the authenticity of the other two parties.
A fair exchange & customer anonymity protocolIJNSA Journal
The rapid development of technology and the reach of such technologies at affordable costs has made it
possible for all people across the world to make purchases at a click of the mouse and at their
convenience.Electronic commerce technologies and protocols facilitate the processing of online
transactions. Trust plays a major role in e-commerce transactions and various protocols help establishing
this trust by providing fair exchange and anonymity.
The research aims at designing and developing a protocol that provides both fair exchange and anonymity,
thus avoiding the need to have manual dispute resolution. It takes into account the technical flaws
researched and overcomes those by implementing methods to ensure that confidentiality and integrity of the
messages are maintained by making sure that the Trusted Third Party does not have the authority to view
or modify the messages but can only verify the authenticity of the other two parties.
The document provides an overview of the Wall Street Coin project, which aims to utilize blockchain technology and smart contracts to solve problems in the traditional stock market. Specifically, it seeks to create a decentralized peer-to-peer system without intermediaries by recording all transactions on an immutable blockchain ledger. This would increase transparency, security, and speed while reducing costs by eliminating fees charged by brokers and other middlemen. The project also aims to make the stock market more accessible and provide a platform for direct investment between companies and investors.
The document summarizes key aspects of negotiation protocols in multi-agent systems, focusing on auctions. It discusses negotiation factors and elements, protocol rules and evaluation criteria. It then provides an overview of common auction types, including English auctions (ascending price, outcry), Dutch auctions (descending price), and sealed-bid auctions. The roles of participants and typical auction processes are also summarized.
The document discusses distributed ledger technology and blockchain, including public vs private distributed ledgers and common use cases. It also summarizes consensus mechanisms, smart contracts, types of cryptocurrencies, SEC regulation of cryptocurrencies as securities, and litigation from the SEC regarding initial coin offerings. Key topics covered include the Howey test for determining if a digital token is a security, registration requirements for security tokens and exchanges in the US, and characteristics that may indicate a cryptoasset is an investment contract and security.
The document provides an overview of the regulation of cryptoassets. It discusses distributed ledger technology and blockchain, the differences between public and private distributed ledgers, common use cases for blockchain technology, consensus mechanisms, smart contracts, types of cryptocurrencies, SEC regulation of security tokens and initial coin offerings (ICOs), CFTC regulation treating virtual currencies as commodities, and notable SEC and CFTC enforcement actions.
An Android Application for Online Agri-AuctionIRJET Journal
1. The document describes an Android application developed by students to enable online agricultural auctions.
2. The application aims to help farmers sell products online so they are not restricted to local markets with limited buyers. It also helps buyers find agricultural products more easily.
3. The application allows farmers to list products for auction and multiple bidders to bid on the products online. The winning bid details are stored once the auction closes.
IRJET- Blockchain-A Secure Mode for TransactionIRJET Journal
The document discusses using blockchain technology to securely process banking transactions. Blockchain uses cryptography to connect blocks in a chain, creating a decentralized and tamper-resistant ledger. This allows transactions to be processed faster, more efficiently and securely without a central authority. The proposed system would use blockchain for banking transactions like account creation, fund transfers, and checking transaction histories. It would provide security through cryptographic hashing, transaction verification across nodes, and use of digital signatures. This could make current banking systems more secure, efficient and reduce fraud compared to centralized databases.
The document proposes a fair e-tendering protocol that addresses security issues with existing electronic tendering systems. It consists of three phases: tenderer registration, tender submission, and winning tenderer trace. The protocol uses techniques like blind signatures and homomorphic encryption to ensure fairness by hiding tender details until submission deadline and anonymizing tenderers' identities until the winner is selected. The protocol aims to convince participants that the tendering process was carried out in a fair and transparent manner.
DIGITAL STOCKS USING BLOCKCHAIN TECHNOLOGY THE POSSIBLE FUTURE OF STOCKS?IAEME Publication
Bitcoin is the first and most successful digital currency in the world. It trends in
the news almost daily, with glowing reviews of the many benefits of an alternative and
international currency. This paper explains the innovative aspect of the technological
platform used to transfer Bitcoin from one party to another. This technology is called
the Blockchain. The Blockchain eschews a bank or other intermediary and allows
parties to transfer funds directly to one another, using a peer-to-peer system. This
disruptive technology has done for money transfers what email did for sending mail —
by removing the need for a trusted third party just as email removed the need for using
the post office to send mail. This technology mainly used for peer-to-peer money
transfers, can also be extended to accomplish other forms of transfers. Blockchain
technology can be used to buy and sell stocks. Real world stocks can be tokenized into
digital stocks which can be easily transferred using peer-to-peer. These digital stocks
act similar to digital currency whose price is real time and fluctuates. Stocks
exchanged completely peer-to-peer could resolve many of the issues facing the stock
market today, including high frequency trading and short sales.
This document provides an overview of blockchain and initial coin offerings (ICOs). It discusses common myths about blockchain, such as the ideas that blockchain is just for Bitcoin, proof of work is the only consensus method, and that all data needs to be stored on a blockchain. The document also covers blockchain use cases, validation of blockchains, and the benefits and challenges of ICOs as a method of fundraising. It aims to demystify blockchain and provide essential information about this emerging technology.
Funding Application for Start-ups with Blockchain ApproachIRJET Journal
This document summarizes a research paper that proposes a blockchain-based approach to crowdfunding for startups. Some key issues with traditional crowdfunding platforms are that campaign creators have complete control over funds raised and there is no transparency around how funds are spent. The proposed approach uses smart contracts on the Ethereum blockchain to control funds and require contributor approval for expenditures. Specifically:
1) A smart contract is created to manage each funding campaign and control where money can be spent.
2) Contributors no longer send money directly to campaign creators. Funds are sent to the smart contract.
3) Creators must submit spending requests and receive approval from over 50% of contributors before funds are released.
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd SensingIoannis Krontiris
In many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However, to further encourage participants to use the system, one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide, but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders’ anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable, can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users.
Full paper: T. Dimitriou, I. Krontiris, "Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing", the 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015), 24-25 August 2015, Heraklion, Crete, Greece.
1. The document provides definitions for various financial market terms.
2. Key terms defined include algorithmic trading, approved publication arrangement, best execution, circuit breakers, clearing, derivatives, high frequency trading, market abuse, market makers, and transparency requirements.
3. The definitions cover a wide range of concepts related to trading, regulations, and infrastructure in financial markets.
International Blockchain Conference in Groningen, Nov. 30, 2018Vlad Burilov
This document summarizes Vlad Burilov's paper on regulation of utility token offerings and crypto exchange listings. It begins with an overview of different types of tokens like protocol tokens, application tokens, and their various models. It then discusses regulators' approaches to classifying tokens, particularly Malta's, which distinguishes virtual financial assets, virtual tokens, and their treatment. The document outlines challenges to regulation like market integrity, investor protection and risk. It analyzes Malta's Virtual Financial Assets Act and whether its requirements are proportionate. Finally, it proposes approaches like disintermediation, introducing gatekeepers, and allowing crypto exchanges more freedom in self-regulation and listing processes.
Blockchain in Media. Description of blockchain and smart contracts. Presented Media pain points and possible solutions. Peeped into various frameworks built on Hyperledger fabric and ethereum for media
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithmTELKOMNIKA JOURNAL
Blockchain Technology is exclusively used to make online transactions secure by
maintaining a distributed and decentralized ledger of records across multiple computers.
Tendermint is a general-purpose blockchain engine that is composed of two
parts; Tendermint Core and the blockchain application interface. The application interface
makes Tendermint suitable for a wide range of applications. In this paper, we
analyze and improve Practical Byzantine Fault Tolerant (PBFT), a consensus-based
Tendermint blockchain algorithm. In order to avoid negative issues of locks, we first
propose a lock-free algorithm for blockchain in which the proposal and voting phases
are concurrent whereas the commit phase is sequential. This consideration in the algorithm
allows parallelism. Secondly, a new methodology is used to decide the size
of the voter set which is a subset of blockchain nodes, further investigating the block
sensitivity and trustworthiness of nodes. Thirdly, to fairly select the voter set nodes,
we employ the random walk algorithm. Fourthly, we imply the wait-freedom property
by using a timeout due to which all blocks are eventually committed or aborted. In
addition, we have discussed voting conflicts and consensuses issues that are used as a
correctness property, and provide some supportive techniques.
Our latest white paper, “Blockchain Technology and the Financial Services Market,” covers themes around:
Distributed ledger and blockchain are about to cause major business transformations in the financial services industry
Three of the most promising fields of application are payment transactions, trade finance and over-the-counter markets
Technical challenges and legal frameworks are currently a major obstacle
Many market participants are exploring ways of using blockchain, including established institutions and start-ups firms
Read the entire research report for expert insights and the full Infosys Consulting point-of-view!
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This document summarizes and analyzes secure multi-party negotiation protocols for electronic payments in mobile computing. It presents a framework for secure multi-party decision protocols using lightweight implementations. The main focus is on synchronizing security features to avoid agreement manipulation and reduce user traffic. The paper describes negotiation between an auctioneer and bidders, showing multiparty security is better than existing systems. It analyzes the performance of encryption algorithms like ECC, XTR, and RSA for use in the multiparty negotiation protocols.
Keynote presentation at the HUBB Conference.
Adj Prof Mascarella clarifies terms, mechanisms and what is the roadmap to use innovation for new business.
IRJET- Smart Contracts using BlockchainIRJET Journal
This document provides an overview of smart contracts using blockchain technology. It introduces the concept of smart contracts and discusses their operation on two mainstream blockchain platforms, Ethereum and Hyperledger Fabric. It also proposes a six-layer research framework for smart contracts consisting of contract negotiation, development, deployment, maintenance, learning, and self-destruction. The document outlines several challenges for smart contracts and reviews recent research progress, and it discusses potential application scenarios in various industries.
The document provides an overview of the Wall Street Coin project, which aims to utilize blockchain technology and smart contracts to solve problems in the traditional stock market. Specifically, it seeks to create a decentralized peer-to-peer system without intermediaries by recording all transactions on an immutable blockchain ledger. This would increase transparency, security, and speed while reducing costs by eliminating fees charged by brokers and other middlemen. The project also aims to make the stock market more accessible and provide a platform for direct investment between companies and investors.
The document summarizes key aspects of negotiation protocols in multi-agent systems, focusing on auctions. It discusses negotiation factors and elements, protocol rules and evaluation criteria. It then provides an overview of common auction types, including English auctions (ascending price, outcry), Dutch auctions (descending price), and sealed-bid auctions. The roles of participants and typical auction processes are also summarized.
The document discusses distributed ledger technology and blockchain, including public vs private distributed ledgers and common use cases. It also summarizes consensus mechanisms, smart contracts, types of cryptocurrencies, SEC regulation of cryptocurrencies as securities, and litigation from the SEC regarding initial coin offerings. Key topics covered include the Howey test for determining if a digital token is a security, registration requirements for security tokens and exchanges in the US, and characteristics that may indicate a cryptoasset is an investment contract and security.
The document provides an overview of the regulation of cryptoassets. It discusses distributed ledger technology and blockchain, the differences between public and private distributed ledgers, common use cases for blockchain technology, consensus mechanisms, smart contracts, types of cryptocurrencies, SEC regulation of security tokens and initial coin offerings (ICOs), CFTC regulation treating virtual currencies as commodities, and notable SEC and CFTC enforcement actions.
An Android Application for Online Agri-AuctionIRJET Journal
1. The document describes an Android application developed by students to enable online agricultural auctions.
2. The application aims to help farmers sell products online so they are not restricted to local markets with limited buyers. It also helps buyers find agricultural products more easily.
3. The application allows farmers to list products for auction and multiple bidders to bid on the products online. The winning bid details are stored once the auction closes.
IRJET- Blockchain-A Secure Mode for TransactionIRJET Journal
The document discusses using blockchain technology to securely process banking transactions. Blockchain uses cryptography to connect blocks in a chain, creating a decentralized and tamper-resistant ledger. This allows transactions to be processed faster, more efficiently and securely without a central authority. The proposed system would use blockchain for banking transactions like account creation, fund transfers, and checking transaction histories. It would provide security through cryptographic hashing, transaction verification across nodes, and use of digital signatures. This could make current banking systems more secure, efficient and reduce fraud compared to centralized databases.
The document proposes a fair e-tendering protocol that addresses security issues with existing electronic tendering systems. It consists of three phases: tenderer registration, tender submission, and winning tenderer trace. The protocol uses techniques like blind signatures and homomorphic encryption to ensure fairness by hiding tender details until submission deadline and anonymizing tenderers' identities until the winner is selected. The protocol aims to convince participants that the tendering process was carried out in a fair and transparent manner.
DIGITAL STOCKS USING BLOCKCHAIN TECHNOLOGY THE POSSIBLE FUTURE OF STOCKS?IAEME Publication
Bitcoin is the first and most successful digital currency in the world. It trends in
the news almost daily, with glowing reviews of the many benefits of an alternative and
international currency. This paper explains the innovative aspect of the technological
platform used to transfer Bitcoin from one party to another. This technology is called
the Blockchain. The Blockchain eschews a bank or other intermediary and allows
parties to transfer funds directly to one another, using a peer-to-peer system. This
disruptive technology has done for money transfers what email did for sending mail —
by removing the need for a trusted third party just as email removed the need for using
the post office to send mail. This technology mainly used for peer-to-peer money
transfers, can also be extended to accomplish other forms of transfers. Blockchain
technology can be used to buy and sell stocks. Real world stocks can be tokenized into
digital stocks which can be easily transferred using peer-to-peer. These digital stocks
act similar to digital currency whose price is real time and fluctuates. Stocks
exchanged completely peer-to-peer could resolve many of the issues facing the stock
market today, including high frequency trading and short sales.
This document provides an overview of blockchain and initial coin offerings (ICOs). It discusses common myths about blockchain, such as the ideas that blockchain is just for Bitcoin, proof of work is the only consensus method, and that all data needs to be stored on a blockchain. The document also covers blockchain use cases, validation of blockchains, and the benefits and challenges of ICOs as a method of fundraising. It aims to demystify blockchain and provide essential information about this emerging technology.
Funding Application for Start-ups with Blockchain ApproachIRJET Journal
This document summarizes a research paper that proposes a blockchain-based approach to crowdfunding for startups. Some key issues with traditional crowdfunding platforms are that campaign creators have complete control over funds raised and there is no transparency around how funds are spent. The proposed approach uses smart contracts on the Ethereum blockchain to control funds and require contributor approval for expenditures. Specifically:
1) A smart contract is created to manage each funding campaign and control where money can be spent.
2) Contributors no longer send money directly to campaign creators. Funds are sent to the smart contract.
3) Creators must submit spending requests and receive approval from over 50% of contributors before funds are released.
Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd SensingIoannis Krontiris
In many mobile crowdsensing scenarios it is desirable to give micro-payments to contributors as an incentive for their participation. However, to further encourage participants to use the system, one important requirement is protection of user privacy. In this work we present a reverse auction mechanism as an efficient way to offer incentives to users by allowing them to determine their own price for the data they provide, but also as a way to motivate them to submit better quality data. At the same time our auction protocol guarantees bidders’ anonymity and suggests a new rewarding mechanism that enables winners to claim their reward without being linked to the data they contributed. Our protocol is scalable, can be applied to a large class of auctions and remains both computation- and communication-efficient so that it can be run to the mobile devices of users.
Full paper: T. Dimitriou, I. Krontiris, "Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing", the 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015), 24-25 August 2015, Heraklion, Crete, Greece.
1. The document provides definitions for various financial market terms.
2. Key terms defined include algorithmic trading, approved publication arrangement, best execution, circuit breakers, clearing, derivatives, high frequency trading, market abuse, market makers, and transparency requirements.
3. The definitions cover a wide range of concepts related to trading, regulations, and infrastructure in financial markets.
International Blockchain Conference in Groningen, Nov. 30, 2018Vlad Burilov
This document summarizes Vlad Burilov's paper on regulation of utility token offerings and crypto exchange listings. It begins with an overview of different types of tokens like protocol tokens, application tokens, and their various models. It then discusses regulators' approaches to classifying tokens, particularly Malta's, which distinguishes virtual financial assets, virtual tokens, and their treatment. The document outlines challenges to regulation like market integrity, investor protection and risk. It analyzes Malta's Virtual Financial Assets Act and whether its requirements are proportionate. Finally, it proposes approaches like disintermediation, introducing gatekeepers, and allowing crypto exchanges more freedom in self-regulation and listing processes.
Blockchain in Media. Description of blockchain and smart contracts. Presented Media pain points and possible solutions. Peeped into various frameworks built on Hyperledger fabric and ethereum for media
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithmTELKOMNIKA JOURNAL
Blockchain Technology is exclusively used to make online transactions secure by
maintaining a distributed and decentralized ledger of records across multiple computers.
Tendermint is a general-purpose blockchain engine that is composed of two
parts; Tendermint Core and the blockchain application interface. The application interface
makes Tendermint suitable for a wide range of applications. In this paper, we
analyze and improve Practical Byzantine Fault Tolerant (PBFT), a consensus-based
Tendermint blockchain algorithm. In order to avoid negative issues of locks, we first
propose a lock-free algorithm for blockchain in which the proposal and voting phases
are concurrent whereas the commit phase is sequential. This consideration in the algorithm
allows parallelism. Secondly, a new methodology is used to decide the size
of the voter set which is a subset of blockchain nodes, further investigating the block
sensitivity and trustworthiness of nodes. Thirdly, to fairly select the voter set nodes,
we employ the random walk algorithm. Fourthly, we imply the wait-freedom property
by using a timeout due to which all blocks are eventually committed or aborted. In
addition, we have discussed voting conflicts and consensuses issues that are used as a
correctness property, and provide some supportive techniques.
Our latest white paper, “Blockchain Technology and the Financial Services Market,” covers themes around:
Distributed ledger and blockchain are about to cause major business transformations in the financial services industry
Three of the most promising fields of application are payment transactions, trade finance and over-the-counter markets
Technical challenges and legal frameworks are currently a major obstacle
Many market participants are exploring ways of using blockchain, including established institutions and start-ups firms
Read the entire research report for expert insights and the full Infosys Consulting point-of-view!
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This document summarizes and analyzes secure multi-party negotiation protocols for electronic payments in mobile computing. It presents a framework for secure multi-party decision protocols using lightweight implementations. The main focus is on synchronizing security features to avoid agreement manipulation and reduce user traffic. The paper describes negotiation between an auctioneer and bidders, showing multiparty security is better than existing systems. It analyzes the performance of encryption algorithms like ECC, XTR, and RSA for use in the multiparty negotiation protocols.
Keynote presentation at the HUBB Conference.
Adj Prof Mascarella clarifies terms, mechanisms and what is the roadmap to use innovation for new business.
IRJET- Smart Contracts using BlockchainIRJET Journal
This document provides an overview of smart contracts using blockchain technology. It introduces the concept of smart contracts and discusses their operation on two mainstream blockchain platforms, Ethereum and Hyperledger Fabric. It also proposes a six-layer research framework for smart contracts consisting of contract negotiation, development, deployment, maintenance, learning, and self-destruction. The document outlines several challenges for smart contracts and reviews recent research progress, and it discusses potential application scenarios in various industries.
Similar to ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM BLOCKCHAIN (20)
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
ANONYMOUS AUCTION PROTOCOL BASED ON TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM BLOCKCHAIN
1. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
ANONYMOUS AUCTION PROTOCOL BASED ON
TIMED-RELEASE ENCRYPTION ATOP CONSORTIUM
BLOCKCHAIN
Jie Xiong and Qi Wang
Department of Computer Science, Jinan University, Guangzhou, China
ABSTRACT
The Ethereum block chain as a decentralized platform is so successful that many applications deployed on
it. However, for the inherent transparency properties and the lack of privacy, deploying a financial
application on top of it is always a challenge. In this paper, we tackle this challenge and propose an
anonymous sealed-bid auction protocol based on time-released encryption atop Consortium Block chain.
We adopt a strict digital certificate-based identity mechanism of the consortium block chain to permit
legitimate participants, and utilize the blind signature based on elliptic curve technology to allowing
anonymous participation. Moreover, a timed release public key encryption algorithm is adopted to encrypt
bids and prevent auctioneer from colluding with bidders. This is completely different from the method
(zero-knowledge proof) used in other papers to prevent collusion between auctioneer and bidder. We
provide a specific analysis of our protocol, which shows that our protocol meets anonymity and
applicability.
KEYWORDS
Consortium Block chain, Smart Contract, Sealed-Bid Auction, Time-Released Encryption, Blind signature.
1. INTRODUCTION
Electronic auction is one of the basic businesses in electronic commerce [28], which is to transfer
the real offline auction scenarios to the Internet. Thus they have the same basic components, that
is, auction participants, auction rules and an arbitration institution. Among them, the auction
participants include bidders and sellers (auctioneers). Auction rules refer to the principles which
recognized and established by the auctioneer and bidder in the process of an auction. The
arbitration institution is responsible for resolving disputes and conflicts during the auction. Online
auctions have the advantages of low cost, wide range and high speed, which is more convenient
and time-saving for participants
.
Traditionally, there are two types of auctions [1]:
1. Sealed-bid auction. This auction system requires that each bidder submits a bid price in sealed
envelope and hands it to the auctioneer before the specified time. After the specified time, these
bids can be opened by auctioneer and the winning bidder can be selected according to certain
rules.
2. Open-bid auction. In this auction system, all bid values are disclosed, and bidders are allowed
to submit bid more than once.
DOI : 10.5121/ijait.2019.9101 1
2. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
2
In this paper, our auction protocol is designed for sealed-bid auction of single-round bidding.
Specifically, an auctioneer needs to purchase a batch of goods, a group of suppliers can provided
goods and they submit bids. The auctioneer wants to buy these goods at the lowest price, each
supplier hopes to get the trading opportunity to trade with the auctioneer. To facilitate this
mechanism, the state-of-the-art solution requires a trusted third party (TTP) to host auction tasks
to achieve the privacy of the participants and the fairness exchange. But TTP stores a lot of
important information about users, so it is comes with potential threats from single-point attacks
to collusion attacks all the time, also it is difficult to find a fully trusted institution to play such a
role in reality.
Recently, many auction protocols were deployed on top of block chain. They take advantage of
the decentralization and transparency properties of the block chain to get rid of the shortcomings
which brought by the third party, for that everyone can check and verify the information on the
ledger. In other words, there exists conflicts in preserving the privacy of the bids and trusting the
auctioneer to compute the lowest bid privately on open block chain. In order to solve such
challenges, cryptographic protocols can be utilized, such as secure multiparty computing (SMC),
secret sharing, etc. But previous research has shown these protocols will make the scheme
especially complicated, which leads to huge communication and computing overheads. There are
also some literature [2], [3], that proposed to use zero-knowledge proof (ZKP) technique to prove
that the auctioneer is legal in counting all the bids value and publishing the results of the auction,
that is, preventing the auctioneer and the bidder from colluding. Especially for the ZKP, it takes a
long time to generate proofs, and to deployment ZKP on smart contracts is particularly
complicated. The data on the chain is publicly visible, so another challenge is that we cannot
guarantee that the auctioneer won’t decrypt the bid on the block chain during bidding time, and
then secretly leaks the price, or disguises himself as a new bidder to participate in it.
According to the level of permission to join the chain, Block chains can be regarded as three types:
Public Block chain, Private Block chain and Consortium Block chain. One of the most special
features of the Consortium Block chain is that any entity node who wants to join the chain needs
permission from the alliance. The Consortium Block chain can be regarded as a specific range of
distributed TTP with high security and credibility. Therefore, it is suitable to announce rigorous
auction activities with identity-based permitting mechanisms, such as limiting the attributes of
participants.
In this paper, we present an anonymous auction protocol based on time-released encryption on
Consortium Block chain. We utilize cryptographic primitives included time release encryption to
guarantee the fairness and security, and blind signature to guarantee the bidder privacy.
Specifically, we implement the following features:
1. Financial fairness. The auctioneer can only decrypt the bid after a certain time, so he cannot
leak any information about bids to other participants who have not bid yet during the bidding
period. And if the auctioneer aborts in the middle, as a punishment, his deposit will be distributed
to other bidders. Also bidders will be disqualified if they quit halfway.
2. Non-repeatable bid. In an auction, the user can only bid once. If a bidder tries to bid multiple
times in one task, the contract will check and cast off the message.
3.Bid privacy. The bid value will be encrypted. Bidders cannot know the bids submitted by the
others before committing to their own. The auctioneer can only know all bids after a specified
time.
3. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
3
4. Identity anonymity. Only the initiator of the auction (auctioneer) and CA know who
participated in this auction, but no one can bind a certain bid to a unique identity. And the bidding
behavior of the same user in multiple auctions cannot be linked to each other.
5. Public verifiable correctness. The data generated during the auction will be written on the chain,
so the participating nodes can verify its correctness. Moreover, the final auction results will also
be published on the block chain can be verified byanyone.
2. RELATED WORK
The electronic auction will find a center as an arbitration institution. This arbitration institution is
generally a trusted third party (TTP) [4], [5], [6]. Usually, the instance of TTP can be an
electronic bank, a certificate issuing authority, or a key distribution authority. Firstly, TTP
publishes the auction rules, the deposit value of the auctioneer, bidding time periods and the time
to open the result. If the legitimate users are interested, they can submit their bids to TTP in a
certain format. In a sealed auction, this bid value should be hidden, after a period of time, TTP
will give out the result or open the winning bidder. TTP is also responsible for resolving
exceptions during the auction, such as someone quit halfway. Many centralized online auction
researches [7], [8], [9] rely on a TTP, and they assume that TTP is semi-honest that he will not
collude with the bidder. It is will-known that the third party stores too much sensitive data,
masters too much power, it is impossible to trust him completely. In reality, numerous real word
incidents reveal that the party might misbehave for self-interests [10], [11] privately, or some of
attackers [12] can compromise its functionality.
In order to avoid the deficiencies brought about by centralization, many researches gradually turn
to discussing the use of multiple centers to weaken the power of one center. For example, [13],
[14], [15] propose multiple auction platforms (APs), they assume most of APs are honest. They
get the auction results, which are calculated by multiple APs through SMC, secret sharing, etc. In
[16], Brandt et al. propose using the announcement of encrypt binary bidding lists on a
blackboard. It uses top-down, bottom-up and binary search techniques to interactively find the
winner bid without revealing unnecessary information. In [17], [18], Abe et al. use homomorphic
encryption, the mix and match technique; it proposes that the auction results can be jointly
calculated in cipher text by each bidder in an interactive manner. Among them, message exchange
is realized through secure channel, which abandons the center and guarantees the privacy of bids.
However, multiple interactions between bidding nodes are required, it costs a lot of
communication between nodes and greatly increases the computation overhead for individual
users. Therefore, it is not well adopted in reality.
Block chain has decentralized and non-tamper features, so it is ideal for deploying electronic
auctions on it. Recently, many researches have focused on combining block chain with auction.
Kosba et al. present Hawk [2], a framework for creating Ethereum smart contract on the block
chain. Anyone can write a Hawk program without having to implement any cryptography, its
compiler can automatically generate privacy-preserving smart contract. In the Hawk program, the
data and the flow of money will be blinded to the public. Hawk also utilizes zero cash technology
to hide user identity. Hawk uses ZKP to prove the honesty of the manager. But studies have
shown that it will take a long time to produce proof using ZKP and deploying ZKP in smart
contract is complex. Blass and Kerschbaum present Strain [19], a protocol to implement sealed-
bid auction on the block chain. Strain protects the bid privacy against fully malicious parties.
Strain also designed a two-party comparison algorithm executed between any pair of bids for
calculate the auction results in cipher text. But the protocol requires multiple interactions between
4. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
4
each participant, and the communication and computation overhead are very large for individual
users. Snchez [3] propose Raziel, a system that combines SMC and ZKP cryptographic primitive
to guarantee the privacy, correctness and verifiability of smart contract. Furthermore, the author
presents that a smart contract owner can prove its validity and correctness without revealing any
information about the source message by using ZKP.
3. PRELIMINARIES
Bilinear Pairing
Throughout this paper, we will use this definition. Let G1 be a cyclic additive group, whose
orders is a prime q , and G2 be a cyclic multiplicative group with the same order q . A bilinear
pairing is a map e : G1 G1 G2 with the following properties:
1. Bilinearity: e(aP, bQ)= e(P, Q)ab
for all P,QG ,a,b Z*
.
1 q
2. Non-degeneracy: e(P, Q) 1.
3. Computability: there exists an efficient algorithm to compute e(P, Q) .
Block chain and Smart Contract
A block chain can be referred to as a distributed database that chronologically stores a chain of
data into sealed blocks [20] in a secure and immutable manner. Head-to-tail blocks guarantee that
transactions are performed in an order, hence a transaction cannot be altered without changing its
block and all the subsequent blocks. The content of the blocks can be written by the peers of the
block chain through the consensus mechanism.
Block chain has four main properties [2]: 1) Reliable delivery of message. Because of the data
written into the block cannot be modified. It is ideal regarded block chain as a ledger to ensure the
persistence of message [21]. 2) Correct computation. The block chain can be seen as a state
machine driven by transactions [22]. The miners continue to receive and validate new blocks,
then package them on the chain, and the results of the calculations will be made public to all peers.
3) Transparency. All internal states and computations via the block chain will be visible to the
whole block chain peers. 4) Pseudonym. A message or a transaction sends by one user in the
block chain is referred to a pseudonym. The block chain address is usually generated by the user's
public key.
In the Ethereum block chain [23], it provides the highest support for Turing's complete
functionality by smart contract. They support the construction and execution of code that allow
for the operation of a function on the block chain, which greatly enriches the flexibility of the
block chain. Conceptually, a smart contract can be regarded as a special “TTP” [24], but this
party is only for correctness and availability but not for privacy, because smart contracts deployed
on block chain are also transparent.
4. TIME RELEASE PUBLIC KEY ENCRYPTION
The goal of time release public key encryption is to send an encrypted message to the future and
wait until a specified time in the future to open. Let us assume that a sender wants to send a
message to a receiver such that the receiver cannot be able to open it until a certain time. The
5. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
5
1 2
q
q
q
1
encryption algorithm introduces a time server (referred to TS). The sender can encrypt the
message using the public key of the recipient and TS without communicating with TS. Only after
the release time has passed, the recipient can decrypt it by using his private key and the signature
information (the information is related to the current time) from the TS. In addition, only the
intended recipient holding the corresponding private key can recover the secret at some time
(enforced by the trusted TS). So the time release public key encryption scheme is secure and
private.
We describe a simple construction of time release public key encryption that is derived from the
technology in [25]. The construction is based on bilinear mapping, and the security is based on
the hardness of the Bilinear Diffie-Hellman Problem.
Time Release Encryption (TRE)
Suppose G1 is additive cyclic groups, whose order is a prime q and G2 is multiplicative cyclic
groups, whose order is also prime q . Let e:G1 G1 G2
is a bilinear map. G is a generator of
G1 . Given the two cryptographic hashfunctions: H :{0,1}*
G*
; H : G*
{0,1}n
.
The TRE scheme contains five algorithms: (TS GEN, User GEN, TS broadcast, ENC, DEC), and
it runs as follows.
TS GEN: The TS takes as input a secure parameters k and outputs system parameters
params {k,q,G1,G2,e,G,H1,H2} and key pair (P
TS ,STS ) of TS. The TS randomly selects s
as the private key STS , where s Z *
. Then TS computes sG as the public key PTS ,
PTS (G, sG) . Only params and PTS are made public.
User GEN: Each user picks a secret key a Z*
and computes the corresponding public key
(aG, asG) .
TS broadcast: It runs by TS. TS inputs a time instant T {0,1}*
and outputs a time-bound key
update of the form sH1(T ) . TS automatically outputs the corresponding time-bound key for all
current time instances T, the validity of which can be publicly verified by each user: checking the
equation e(sG, H1(T )) e(G, sH1(T )) is true, where (G, sG) PTS .
ENC: This algorithm is executed by sender. Given a message M, a receiver public key
(aG,asG) , a PTS , and a release time T {0,1}*
,
1) First, we need to verify whether the receiver really needs the server’s time-bound key update
message to decrypt the message M. So it checks e(aG, sG) e(G, asG) ; If the equation is true,
the encryption algorithm continues.
2) Select a random number r Z *
, then compute rG and rasG
3) Compute K e(rasG,H1(T)) e(G,H1(T))ras
4) Output the cipher text C U,V rG,M H2(K) .
2
6. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
6
1 1
n
DEC: This algorithm is executed by receiver. It inputs a cipher text C, a receiver private key a ,
and a time-bound key update sH1(T ) from TS, that output is message M.
1) Compute K e(U,sH (T))a
e(G,H (T))ras
K .
2) Compute V H2 (K) to recover messageM.
A Sketch of Security Analysis
The security proof is the same to [25], we will simply describe it here.
1. The server private key is safe, for the Discrete Log (DL) problem is difficult (given G, sG , it
is difficult to find s).
2. The user private key is safe, for this problem is at least as difficult as the DL problem (given
G, sG, aG, asG , it is difficult to find a).
3. The server private key is safe, for that: to find s from {G, sG, sH1(T1), sH1(T2 ),...} to rewrite
any sH1(Ti ) is at least as difficult as the DL problem.
4. The decryption is difficult without having receiver and TS private key. If a receiver wants to
decrypt a message before its release time, the easiest way is to solve the Bilinear Diffie-Hellman
Problem (because the difficulty of the original problem is equal to the Bilinear Diffie-Hellman
Problem in [25]). If the Bilinear Diffie-Hellman Problem is difficult, the receiver cannot decrypt
any cipher text unless the release time arrival or he colludes with the TS.
5. BLIND SIGNATURE BASED ON ELLIPTIC CURVE
Blind signature [26] is a cryptographic protocol involving both the user and the signer. The user
sends the blinded information to the signer, who signs the information but cannot obtain the
specific content of the signed information. After the user receives the signed information and
removes the blind factor, he can get the signature of the original message by the signer. Even if
the signer sees this real signature, he cannot be sure if it came from his signature. Blind signature
algorithm can effectively protect the specific content of signed messages or documents, so it plays
a key role in the application of anonymity in electronic auction. Our protocol makes an extensive
use of Blind signature scheme [27] which base on elliptic curve, and it has stronganonymity.
Common parameters are:
E(Fq ) : an elliptic curve defined on a finite field;
G E(Fq ) : a base point in elliptic curve;
q: a prime number;
d R Z *
: a signature private key; Q dG is a public key for verify the signature.
SHA-1: {0,1}*
{0,1}160
is a cryptographic hash function.
Among the above parameters, d is private and other parameters are public. Next we will describe
the algorithm, where the notation
represents the coordinates of point A.
(||) indicates to connect two bit strings, and RX ( A)
7. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
7
n
n
SIG:
1) The signer generates private key
Y kG and announce it to user.
k R Z *
, then calculates the corresponding public key
2) The user picks three blind factors , , R Z *
, then calculates:
A Y G Q (x, y) ; t x modn ; c SHA 1(m ||t) ; c 1
(c ) , Where m is
the original message and c is the blinded message. User sends c to the signer.
3) Signer calculates: s k cd modn , where s is the result after the signer signs c . The
signer then sends s to the user.
4) User calculates: s s mod n . (c, s) is a blind signature for m.
VER:
The verifier checks if c SHA 1(m || Rx (cQ sG) mod n) , if this equation is true, the
signature is valid. Otherwise the verifier rejects the signature.
A Sketch of Security Analysis:
The specific security proof process can be referred to [27]. The validity of the signature is based
on the security guarantee of the Schnorr Blind Signature Scheme, and the blindness is based on
the DL Problem of the elliptic curve.
6. BLOCK CHAIN AUCTION PROTOCOL
System Model
In this section, we illustrate the specific process of the auction detail. Our system comprises four
types of entities, as shown in Figure 1. The CA is responsible for issuing certificate to each user
who is permitted to participate, and issuing public and private key pairs for two smart contracts.
The auctioneer is responsible for announcing an auction task, publishing the list of users who are
allowed to join in auction, the public parameters to be used in the calculation, the registration time,
the bidding time instance and the finish time. During the auction process, the auctioneer also
needs to sign the bid message for users, and finally decrypt all the bidding cipher text. The bidder
bids in cipher text. Contract-1 and Contract-2 are deployed on the Consortium Block chain.
The serial number in the Figure 1 indicates the flow of the protocol:
1. Bidder generates the key pair ( xi , yi ) ; 2. Bidder Bi applies for registration from CA; 3. CA
checks the bidder real identity, then issues certi for Bi ; 4. CA sends ( X1,Y1), (d,Q), ( X2 ,Y2 )
via secure channel to the auctioneer; 5. Bidder blinds the bid bi to ci ; 6. Bidder applies for
signature; 7. After the contract-1 verifies the certi for Bi , it sends ci to auctioneer; 8. The
auctioneer sends the signature si ; 9. Bidder downloads the si from contract-2; 10. Bidder
removes the blind factors; 11. Bidder sends the encrypted submission (bidding message); 12. The
8. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
8
contract-2 collects submission and sends Esubi to the auctioneer; 13. Auctioneer verifies the
signature, decrypt the Esubi , at last, submit the result on the chain.
Figure 1. A process model of our auction protocol
We adopt consortium block chain in our scheme. Auctioneer communicates with bidders and
smart contracts through an Ethereum block chain network where bidders send signature requests
or encrypted bids to contracts, etc. After the contract receives parameters, the corresponding
function will automatically execute and the execution result will be written into the block chain.
Storing a private key in a smart contract is not secure, and the smart contract requires an external
trigger can run. In order to prevent the auctioneer decrypt bids and leaked them in advance, as we
mentioned before. We introduced a time release encryption algorithm when encrypting the bids,
the auctioneer can decrypt the bids cipher text until the finish time arrival. This prevents the
auctioneer from colluding with the bidder during the process of auction.
Definitions
List1: signature record table. The contract-1 records the signature information for each
anonymous bidder to prevent bidder from bidding multiple times in one auction.
List2: bidding record table. The contract-2 stores the bidding information.
List3: it stores results of an auction task.
Contract-1: It stores the List1. The message sent to the contract-1 address in the form of a
transaction through block chain network.
Contract-2: It stores List2 and List3. The message sent to the contract-2 address also in the form
of a transaction.
9. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
9
The Construction of Protocol
Parameters Setup and Auction Publish
The auctioneer initially setup the parameters to be used in an auction task, and broadcasts the
auction task in the block chain network. TS also runs the TS GEN algorithm in TRE protocol as
mentioned before to initialize parameters.
1) Setup the auction task and deposit the budget. The auctioneer deploys contract-1 and contract-2.
The deposit is a sum of money that the auctioneer needs to send into the contract-2 account.
Assume the auctioneer has aborted the protocol or has been caught cheating, then the money will
be distributed to the bidders as a punishment.
2) T1,T2 ,T3,T4 define the time intervals for the following four phases: register at CA, sign for
bids value, bidder submits bid, and publish the auction result, respectively.
3) CA picks elliptic curve E(Fq ) and the base point G E(Fq ) .
4) TS runs the TS GEN algorithm to initialize and announce system parameters params , PTS,
where PTS is the public key of TS. The auctioneer runs the User GEN algorithm in TRE protocol
to generate a key pair (aG, asG) (which will be used for bidders to encrypt bids) for this task
only.
5) The auctioneer, CA and TS announce the above public parameters and informs the bidders to
start registration. The registration phase should be completed within T1.
Register at Certification Authority
The bidder registers at CA to get a certificate bound to his/her unique identity ID. At the same
time, CA generates public and secret key pairs for contract-1 and contract-2.
1) The bidder Bi generates a random number xi as a secret key and calculates the corresponding
public key yi xiG .
2) Bisends {yi , IDi } to theCA.
3) The CA checks the identity of the bidder Bi and checks whether he is eligible to participate in
this auction. After the review is passed, CA will issue a certificate certi to Bi .
4) CA generates signature key pairs for contract-1, ( X1,Y1) and (d ,Q), then sends X1,d to the
auctioneer over the secure channel. The secure channel of this paper is implemented by TLS,
which ensures the confidential and integrated for information, and also it can prevent
eavesdropping.
5) The contract-1 generates the signature record table List1. The list consists of the bidder's
certificate and the bid flag. The flag is used to indicate whether the user has applied for a
10. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
10
signature before, 0 means no application has been made, and 1 means already applied. List1 is
shown in Table 1.
6) CA generates the key pair of contract-2 ( X2 ,Y2 ) , and sends
secure channel.
Table 1. Heading and text fonts
.
X 2 to the auctioneer through the
Bidder’s Cert Bid Flag
1 Cert1 0
2 Cert2
1
n Certn 0 or 1
Sign for Bids Value
The bidder blinds the bid that needs to be signed, then he sends it to the contract-1 address. After
verify it by List1, the auctioneer will collect the application from contract-1 and sign it, then send
the signature back to the contract. The user can get his signature directly from contract-1.
1) Bidder B selects the blinding factors , , Z *
, then calculates:
i i i i R n
A Y G Q (x , y ) ; t x mod n ; c SHA 1(b || t ) ; c 1
(c ) , Where
i 1 i i i i i i i i i i i i i
bi is the plaintext of bid value, ci is the blinded bid value.
2) The bidder sends {certi || ci}to the contract-1 via the securechannel.
3) After contract-1 receives the blinded bid, it checks whether the bidder's certificate is legal. If
the validation fails, it will refuse to sign for the blinded bid.
4) The contract-1 will check if the flag corresponding to certi in List1 is equal to 0, that is, check
if the user has applied for a signature before. If the flag is 1, then it refuse to sign.
5) The auctioneer keeps the secret key d of contract-1, so he will download the {certi || ci}and
execute signing, that is, calculates:
List1 as 1.
si k cid mod n . Then it marks the position of certi in
6) After the auctioneer sends the signature si to contract-1, bidder Bi can get the signature si.
Bidder Submits Encrypted Bid Value
The bidder recovers the signature of the original bid value by removing the blind factor, then he
encrypts the bid value and sends it to the contract-2 anonymously.
1) Bi removes blind factors in si , that iscalculates:
si for the original bid value.
si isi i mod n . It can get the signature
11. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
11
2) Bipacks the submission {(ci , si ) || bi}, then he runs the ENC algorithm in TRE we mentioned
before to encrypt it, that is calculated: Esubi ENC{(ci ,si ) ||bi}Y ,P ,T .
3) Bi sends Esubi to the contract-2 by his one-time address.
2 TS
Statistics and Publish the Results
TS periodically runs the BCST algorithm on all time instances, in order to calculate time-bound
key sH1(T ) and broadcasts it. The auctioneer will get the correct sH1(T ) from the TS when the
specified decryption time is reached. The auctioneer collects the cipher text of bids can decrypt
them, and verifies the validity of the signature. The contract-2 also checks if the user has been bid
before, for the List2 has stored the bidding record. Because the signature scheme we used has a
strong anonymity feature, we can guarantee that user's certificate can be used only once in the
same auction process. Then the auctioneer computes the auction result. The user with the lowest
bid is winner, he will receive the auctioneer’s deposit. Finally, the results will be written into the
ledgers and published.
1) After all Esubi are sent to the contract-2 address, the auctioneer collects them and uses the
secret key X 2 and a time-bound key update sH1(T ) to decrypt them. For each Esubi , it will run
the DEC algorithm in TRE to calculate {(ci ,si ) ||bi} DEC{Esubi}X ,sH (T ) to get the real
2 1
bidding message. Subsequently, it verifies that the validity of the signature (ci , si ) . That is to
calculate: ci SHA 1(bi || Rx (ciQ siG) mod n) . If they are equal, the signature is valid;
otherwise, the Esubi will be discarded.
2) Pick out ci and check if there exits ci in the bidding record table List2. If it exists, discard it;
otherwise, write ci into List2.
3) After all bids have been decrypted, the auctioneer collects bi , then compares these bids to gets
the auction results.
4) The auctioneer announces all {(ci , si ) || bi} to contract-2 and adds the result into List3. At last,
the {(ci , si ) || bi} and List3 will be written into the ledger after the consensus algorithm and node
verification.
In this process, if the auction activity cannot proceed normally due to the malicious auctioneer
aborts the protocol, the contract will automatically allocate the auctioneer's deposit to the
participating users. Due to the blindness of blind signatures, even if the auctioneer sees this real
signature, he cannot be sure who it comes from. So he cannot link one user’s bidding behavior to
his true identity.
Analysis of the Protocol
Financial fairness and correctness. It is clear to see the auctioneer will obtain the result after
certain time, the winner would receive the amount of payments. Condition on that they all follow
the protocol, the block chain can be modeled as an ideal public ledger, the time release public key
12. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
12
encryption is correct and confidential and the blind signature based on elliptic curve with strong
anonymous and correctness.
Non-repeatable bid. The malicious bidders is straightforward, the way they can cheat are: (i)
submitting more than one bids for one (ci , si ) in section 6.3.4; (ii) steal other bid information in
advance; (iii) sending the contract-2 a fake instruction without having a legal identity in bidding
submitting phase; (iv) altering the policy specified in the contract. The first threat is simply
handle by the blind signature based on elliptic curve with strong anonymous, it can ensure one
identity bind one bid in an auction. The second treat can be prevent due to the correctness and
security of time release public key encryption. The third threat can be simple handled by the
contract-1 and contract-2 store the List1 and List2, and the digital signature is security. The last
threat is trivial, for the block chain security ensures the data on the chain is immutable.
Bid privacy. If the malicious auctioneer deny the payments or other policy announced in auction
publish phase (section 6.3.1) or decrypt and leak the bids in advance. The first issue is prevented
because the smart contract is publicly on the chain. The second threat is prohibited by the fairness
of TRE protocol, the auctioneer can decrypt these bids until certain time arrival.
Identity anonymity. Every auctioneer/bidder will generated one-task-only block chain address
with each auction activity, and the blind signature scheme hidden the user identity. Only the CA
and auctioneer know who participate in this auction, but no one can bind a certain bid to a unique
identity, and the bidding behavior or the same user in multiple auctions cannot be linked.
Public verifiable correctness. The auction result with each user’s bid message will be open
without disclose their identity. For a bidder, he can check his bid has been recorded on the chain.
For the auction results are public, everyone can verify the correctness. Subsequently, the winner
can find the auctioneer privately for follow-up trade.
Theorem 1. The bids confidentiality of our protocol holds, condition on that the underling time
release public key encryption is semantically secure and the TS is honest. The anonymity of our
protocol for bidders will be satisfied, if the underlying blind signature based on elliptic curve
satisfies the strong anonymity and blindness. If the Consortium Block chain infrastructure we rely
on can be regarded as an ideal public ledger, the underlying encryption and blind signature
protocol are secure, our protocol satisfies: security against a malicious auctioneer and against
malicious bidders.
7. DISCUSSION
We compare our scheme to some existing auction schemes deployed on the block chain. For the
privacy of scheme, Strain [19] propose to use pseudonym in hiding user identity, but when the
first money is transferred to a new address, his identity will be exposed. Hawk [2] utilizes Zero
cash technology to hide identity, which particularly used in crypto currencies. It uses ZKP to
prove the honesty of the manager, so it must deploy the ZKP function on the smart contract.
Raziel [3] combines SMC and ZKP cryptographic primitives to guarantee the identity privacy,
correctness and verifiability of smart contract. The main challenge of deploying smart contracts is
that they can only support very light operations for computing. It is more powerful, but the
deployment of the experiment is more complicated. According to the experimental results in the
Hawk, it takes at least hundreds of seconds to generate proof using ZKP in auction scenarios.
13. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
13
We use the blind signature based on elliptic curve, one-time block chain address and the strict
identity access mechanism accompanied by Consortium Block chain to guarantee the privacy of
the participants and smart contract. Moreover, we are the first to introduce the TRE technology to
prevent auctioneer from leaking bidding information in advance and collusion with bidders. We
use smart contracts to store and collect data, without having to perform very complex operations,
so it takes very little time for the contract to run on the chain.
As far as the computation/communication overhead on-chain. For the contract-1, it only stores
applications for the signatures from user and maintains the List1. For the contract-2, it only
collects the cipher text of bidding information (submissions) and maintains the List2. The main
computational cost is borne by the auctioneer, and he should sign the bidding information and
decrypt the cipher text of bids. But this calculation can also be outsourced to a secure computing
center, or an external hardware to deploy cryptographic functions if necessary. For the
participating supplier, their local computing and communication overhead is also very small.
Therefore, the on-chain performance of the system can be clearly practical regarding time, and the
entire protocol will be efficient.
Performance Evaluation
We implement our auction protocol atop Ethereum, and conduct experiments of auction tasks in
an Ethereum test net to evaluate the applicability. We simulated several types of nodes on the
chain to run the entire protocol process. Experiment results have shown that our protocol is
feasible, and it spends little time on the chain, as well as meets the requirements mentioned earlier.
On the other hand, we have measure the main computation costs for auctioneer and bidder in our
protocol with Python, the experiments are conducted on Ubuntu 16.04.3 LTS with Intel(R)
Core(TM) i7-6500 CPU 2.50GHz and 4GB RAM. To achieve better accuracy, we have
performed the blind signature test 500 times and the TRE test 500 times, and we choose the
average value of all results. All nodes in the private p2p test network were connected and
propagated transactions and messages to each other. On the testnet we generated our own private
block chain creating unique Merkle hash root and new block. Because of the smart contracts can
only support very light on-chain operations for computing, the heavy computation of signature
and encryption are done off-chain. In our implementation, we increased the number of nodes for
testing. We set other parameters by default, for instance, the length of data is 100 bits, the length
of random number is 400 bits, the length of modulus is 512 bits and the length of exponent is 80
bits. Then we tested the performance of each algorithm with different number of users. The
performance of each algorithm was shown in Figure 2,3, the algorithm included“ENC”and
“DEC”in TRE protocol, the“blind”,“sign”and“verify”in blind signature protocol.
Figure 2. Computation time of each algorithm in our protocol.
14. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
14
Figure 3. Computation time with majority bidders.
Notes: UBlind denotes the blind signature algorithm used in our paper runs by a bidder; UENC
denotes the TRE encryption algorithm runs by a bidder; ASIG denotes the signature algorithm
runs by an auctioneer, AVRY denotes the verification algorithm runs by an auctioneer and ADEC
denotes the TRE decryption algorithm runs by an auctioneer.
In general, the above tests show that we have achieved the lightweight of Blind signature and
TRE in our scheme, nearly all of the computation overhead has been transferred to user off-chain.
It is clear that the time to store the date on the chain can be efficiently executed, therefore, our
auction protocol on the block chain can be clearly efficient and feasible.
Future Work
As the current smart contract technology is at early stage and can only allow deploy very easy
operation or allow tiny storage. Can we further explore the possibility of allowing smart contract
to automate operations such as decryption and verification of signature? On the other hand, can
we use new storage technologies, or combine off-chain storage to assist more large scale auction
activities. For the anonymity, we can investigate other approaches applicable on consortium block
chain where we can protect the privacy of the auctioneer.
8. CONCLUSIONS
In this paper, we presented an anonymous sealed-bid auction protocol on the consortium block
chain. We adopt a strict digital certificate-based identity mechanism of the consortium block
chain to permit legitimate participants. The auction protocol maintains the privacy of bids so the
bidders do not know any information about the other bid before certain time, and we achieve it
through a time release encryption scheme. Additionally, we use the strong blind signature based
on elliptic curve technology to protect the privacy of the bidder identity. Moreover, the auction
smart contract have no complex operations, the computation overhead on the chain is verytiny.
15. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
15
REFERENCES
[1] Krishna, V. (2009). Auction theory. Academic press.
[2] Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016, May). Hawk: The blockchain
model of cryptography and privacy-preserving smart contracts. In 2016 IEEE symposium on security
and privacy (SP) (pp. 839-858). IEEE.
[3] Sánchez, D. C. (2018). Raziel: private and verifiable smart contracts on blockchains. arXiv preprint
arXiv:1807.09484.
[4] Juels, A., & Szydlo, M. (2002, March). A two-server, sealed-bid auction protocol. In International
Conference on Financial Cryptography (pp. 72-86). Springer, Berlin, Heidelberg.
[5] Brandt, F. (2003). Fundamental aspects of privacy and deception in electronic auctions.
[6] Brandt, F. (2006). How to obtain full privacy in auctions. International Journal of Information
Security, 5(4), 201-216.
[7] Naor, M., Pinkas, B., & Sumner, R. (1999, November). Privacy preserving auctions and mechanism
design. In Proceedings of the 1st ACM conference on Electronic commerce (pp. 129-139). ACM.
[8] Cachin, C. (1999, November). Efficient private bidding and auctions with an oblivious third party. In
Proceedings of the 6th ACM conference on Computer and communications security (pp. 120-127).
ACM.
[9] Sako, K. (2000, January). An auction protocol which hides bids of losers. In International Workshop
on Public Key Cryptography (pp. 422-432). Springer, Berlin, Heidelberg.
[10] P. Muncaster. China’s Internet wunderkind in the dock over alleged fraud. [Online]. Available:
http://www.theregister.co.uk/2012/07/03/qihoo fraud traffic comscore
[11] H. Wei. Alipay apologizes for leak of personal info. [Online]. Available:
http://www.chinadaily.com.cn/china/2014-01/07/content 17219203.htm
[12] H. Kelly. Apple account hack raises concern about cloud storage. [Online]. Available:
http://www.cnn.com/2012/08/06/tech/mobile/icloud-security-hack/
[13] Ham, W., Kim, K., & Imai, H. (2003). Yet another strong sealed-bid auctions. In Proceedings of the
Symposium on Cryptography and Information Security SCSI.
[14] Kikuchi, H. (2002). (M+ 1) st-price auction protocol. IEICE TRANSACTIONS on Fundamentals of
Electronics, Communications and Computer Sciences, 85(3), 676-683.
[15] Kurosawa, K., & Ogata, W. (2002, October). Bit-slice auction circuit. In European Symposium on
Research in Computer Security (pp. 24-38). Springer, Berlin, Heidelberg.
[16] Brandt, F. (2001, September). Cryptographic protocols for secure second-price auctions. In
International Workshop on Cooperative Information Agents (pp. 154-165). Springer, Berlin,
Heidelberg.
[17] Abe, M., & Suzuki, K. (2002, February). M+ 1-st price auction using homomorphic encryption. In
International Workshop on Public Key Cryptography (pp. 115-124). Springer, Berlin, Heidelberg.
16. International Journal of Advanced Information Technology (IJAIT) Vol. 9, No.1, February 2019
16
[18] Abe, M., & Suzuki, K. (2002, September). Receipt-free sealed-bid auction. In International
Conference on Information Security (pp. 191-199). Springer, Berlin, Heidelberg.
[19] Blass, E. O., & Kerschbaum, F. (2018, September). Strain: A secure auction for blockchains. In
European Symposium on Research in Computer Security (pp. 87-110). Springer, Cham.
[20] Roehrs, A., da Costa, C. A., & da Rosa Righi, R. (2017). OmniPHR: A distributed architecture
model to integrate personal health records. Journal of biomedical informatics, 71, 70-81.
[21] Garay, J., Kiayias, A., & Leonardos, N. (2015, April). The bitcoin backbone protocol: Analysis and
applications. In Annual International Conference on the Theory and Applications of Cryptographic
Techniques (pp. 281-310). Springer, Berlin, Heidelberg.
[22] Buterin, V. (2014). A next-generation smart contract and decentralized application platform. white
paper.
[23] Ethereum, W. G. (2014). A secure decentralised generalised transaction ledger [J]. Ethereum project
yellow paper, 151, 1-32.
[24] Delmolino, K., Arnett, M., Kosba, A., Miller, A., & Shi, E. (2016, February). Step by step towards
creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In International
Conference on Financial Cryptography and Data Security (pp. 79-94). Springer, Berlin, Heidelberg.
[25] Blake, I. F., & Chan, A. C. F. (2004). Scalable, Server-Passive, User-Anonymous Timed Release
Public Key Encryption from Bilinear Pairing. IACR Cryptology ePrint Archive, 2004, 211.
[26] Stadler, M., Piveteau, J. M., & Camenisch, J. (1995, May). Fair blind signatures. In International
Conference on the Theory and Applications of Cryptographic Techniques (pp. 209-219). Springer,
Berlin, Heidelberg.
[27] Wang, H. Q., Zhang, J., & Zhao, J. X. (2005). Schnorr blind signature based on elliptic curve.
Jisuanji Gongcheng yu Sheji(Computer Engineering and Design), 26(7), 1819-1822.
[28] Almeida, F., Santos, J. D., & Monteiro, J. A. (2014). E-commerce business models in the context of
web3. 0 paradigm. arXiv preprint arXiv:1401.6102.