A Secure E-Tender Submission Protocol
نویسندگان
چکیده
There is fundamental difference between a simple e-tender box and a traditional physical tender box. Access to the e-tender box has become a private activity in contrast with the public access to a traditional tender box. A significant opportunity is therefore created for malicious business collusion by use of a simple e-tender box even though it may have cryptographic keys. This indicates that a different approach to the e-tender box is needed. This paper presents a secure e-tender submission protocol to address the advanced security requirements in e-tender submission. The principles of commitment schemes have been applied to the protocol design to prevent submission time dispute and collusion between favoured parties. The protocol is assumed to run under the condition that all tendering parties (principal and tenderers) are dishonest players. The security analysis shows that the protocol meets its security goals under well known colluding scenarios.
منابع مشابه
A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL
Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...
متن کاملSecure E-Tendering System using Identity Based Signcryption from Bilinear Pairings
An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems—authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key issues to be addressed in the...
متن کاملSecure E-Tendering Using Identity Based Encryption from Bilinear Pairings
An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems—authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key issues to be addressed in the...
متن کاملElectronic Submission Protocol Based on Temporal Accountability
This paper describes various possible attacks on temporal properties such as temporal records of payment times and declarations of the closing times for electronic submissions, and explains defense measures that use a trusted third party to provide temporal accountability. We propose a secure electronic submission protocol as a typical time-sensitive application and a temporal accountability lo...
متن کاملUnconditionally Secure Quantum Bit Commitment Is Possible
Bit commitment involves the submission of evidence from one party to another so that the evidence can be used to confirm a later revealed bit value by the first party, while the second party cannot determine the bit value from the evidence alone. An unconditionally secure bit commitment protocol utilizing quantum states is presented. The generality of previous proofs on the impossibility of qua...
متن کامل