Abstract
In this paper, we propose an improvement on Chang et al.'s efficient anonymous auction protocols to overcome the security weakness in initiation phase of Chang et al.'s scheme. At first, we formally analyze the initiation phase of Chang et al.'s scheme on the basis of authentication tests to disclose the insecurity of the initiation phase. Then we give our attack to the initiation phase, which can make the following auction phase fail to run. Later, we propose our improvement on the initiation phase. Finally, we formally analyze our improved scheme with authentication tests, and prove the security of our improved scheme. Our improved scheme can preserve the merits of Chang et al.'s scheme and overcome the security weakness in initiation phase of Chang et al.'s scheme.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.