Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Security and High Performance Computing Systems
Guest editors: Luca Spalazzi and Luca Viganò
Article type: Research Article
Authors: Dreier, Jannika; b; c; * | Dumas, Jean-Guillaumed | Lafourcade, Pascale
Affiliations: [a] Université de Lorraine, Loria, UMR 7503, Vandoeuvre-lès-Nancy, France | [b] Inria, Villers-lès-Nancy, France | [c] CNRS, Loria, UMR 7503, Vandoeuvre-lès-Nancy, France. E-mail: [email protected] | [d] Université Grenoble Alpes, CNRS, Laboratoire Jean Kuntzmann, Grenoble Cedex 9, France. E-mail: [email protected] | [e] University Clermont Auvergne, LIMOS, Aubière Cedex, France. E-mail: [email protected]
Correspondence: [*] Corresponding author: Jannik Dreier, Université de Lorraine, Loria, UMR 7503, F-54506 Vandoeuvre-lès-Nancy, France. E-mail: [email protected].
Abstract: Auctions have a long history, having been recorded as early as 500 B.C. [Auction Theory, Academic Press, San Diego, USA, 2002]. Nowadays, electronic auctions have been a great success and are increasingly used in various applications, including high performance computing [Concurrency and Computation: Practice and Experience 14(13–15) (2002), 1507–1542]. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt [International Journal of Information Security 5 (2006), 201–216] developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol – when using malleable interactive zero-knowledge proofs – is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants’ bids. We provide an efficient parallelized implementation of the protocol and the attack to show its practicality. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems.
Keywords: Anonymity, applied cryptography, cryptographic protocols, privacy-enhancing technology
DOI: 10.3233/JCS-150535
Journal: Journal of Computer Security, vol. 23, no. 5, pp. 587-610, 2015
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]