A Fair and Secure Reverse Auction for Government Procurement
Total Page:16
File Type:pdf, Size:1020Kb
sustainability Article A Fair and Secure Reverse Auction for Government Procurement Chia-Chen Lin 1,*, Ya-Fen Chang 2, Chin-Chen Chang 3 and Yao-Zhu Zheng 4 1 Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, Taichung 41170, Taiwan 2 Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung 40401, Taiwan; [email protected] 3 Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan; [email protected] 4 Department of Computer Science, National Tsing Hua University, Hsinchu 30013, Taiwan; [email protected] * Correspondence: [email protected] Received: 21 August 2020; Accepted: 12 October 2020; Published: 16 October 2020 Abstract: With the development of e-commerce, the electronic auction is attracting the attention of many people. Many Internet companies, such as eBay and Yahoo!, have launched online auction systems. Many researchers have studied the security problems of electronic auction systems, but few of them are multi-attribute-based. In 2014, Shi proposed a provable secure, sealed-bid, and multi-attribute auction protocol based on the semi-honest model. We evaluated this protocol and found that it has some design weaknesses and is vulnerable to the illegal operations of buyers, which results in unfairness. In this paper, we improved this protocol by replacing the Paillier’s cryptosystem with the elliptic curve discrete (ECC), and we designed a novel, online, and multi-attribute reverse-auction system using the semi-honest model. In our system, sellers’ identities are not revealed to the buyers, and the buyers cannot conduct illegal operations that may compromise the fairness of the auction. Keywords: auction; government procurement; e-commerce; information security 1. Introduction In recent years, electronic commerce, also known as e-commerce, has developed quickly. More and more consumers prefer to shop on the Internet for convenience and other benefits. As a kind of e-commerce, e-auctions also have attracted much attention. Many Internet companies, such as eBay and Yahoo!, have launched online auction platforms. Many governments have also participated in online procurement auctions. However, most of them may partially digitalize the procedure of proposal collection. As for the determination of the final winner, either it is mainly proceeded by operators rather than the digitized and automated operation or the bids have not been properly protected so that bribing problems would occur in online government procurements. Based on whether they have opening bid prices, auctions can be classified into two types including sealed-bid auctions and open auctions [1]. Furthermore, open auctions can be classified into English auctions and Dutch auctions. In an English auction, the auctioneer publishes a basic price, and bidders openly submit their bids. The bid price should be higher than the basic price, and the auction will be terminated if no bidders submit a higher price. The bidder who submits the highest price wins the auction. In a Dutch auction, the auctioneer publishes a basic price at the beginning of the auction. If no one wishes to pay this price, the auctioneer decreases the price until some bidder accepts it, and this bidder becomes the winner. Sustainability 2020, 12, 8567; doi:10.3390/su12208567 www.mdpi.com/journal/sustainability Sustainability 2020, 12, x FOR PEER REVIEW 2 of 12 Based on the numbers of buyers and sellers, auctions can be classified into one-side auctions and doubleSustainability auctions2020 [2]., 12 ,In 8567 one-side auctions, there are several buyers in the auction for one seller or vice2 of 12 versa. The former situation is called a forward auction that is used commonly in antique auctions. In a reverse auction, there are multiple sellers for a single buyer, as shown in Figure 1b, which gives buyers aBased chance on to the find numbers the lowest-price of buyers seller. and sellers,This type auctions of auction can includes be classified governments into one-side that invite, auctions forand example, double tenders auctions for [2 ].the In one-sideconstruction auctions, of infrastructure. there are several As buyersfor the indouble the auction auction, for oneit is seller a combinationor vice versa. of forward The former and reverse situation auctions. is called In a ot forwardher words, auction in double that is auctions, used commonly there are in many antique buyersauctions. and sellers In a reverse in the process. auction, A there good are exam multipleple of a sellers double for auction a single is the buyer, stock as market. shown in Figure1b, whichBased gives on how buyers they a determine chance to find the winner, the lowest-price auctions seller.can be This classified type of into auction single-attribute includes governments auctions andthat multi-attribute invite, for example, auctions tenders [3,4]. In for a single-attrib the constructionute auction, of infrastructure. the price is As often for the the only double determinant auction, it is of thea combination auction. In ofmulti-attribute forward and reverseauctions, auctions. more determinants In other words, influence in double the results auctions, of therethe auction, are many suchbuyers as price, and the sellers quality in the of process.the product, A good the exampledelivery date, of a double and so auction on. is the stock market. FigureFigure 1. Different 1. Different kinds kinds of auctions: of auctions: (a) Forward (a) Forward auction, auction, (b) (Reverseb) Reverse auction auction and and (c) Double (c) Double auction. auction. ManyBased researchers on how they have determine studied security the winner, issues auctions in online can beauctions classified using into various single-attribute cryptographic auctions methods,and multi-attribute such as symmetrical auctions [encryptions3,4]. In a single-attribute and asymmetrical auction, encryptions, the price is different often the types only determinantof digital signatures,of the auction. such as In ring multi-attribute signature [5], auctions, message more authentication determinants codes, influence secret the sharing, results ofand the secure auction, multipartysuch as price,computation. the quality These of the methods product, are the intended delivery to date, solve and security so on. and other issues in online auctions,Many such researchersas the privacy have of bids, studied the securityprivacy of issues the bidders’ in online identities, auctions and using the various efficient cryptographic operation of themethods, auction. such However, as symmetrical most of these encryptions methods and are asymmetrical used to solve encryptions,the above issues diff erentof single-attribute types of digital auctions.signatures, Only sucha few as of ring the signaturerelated research [5], message results authentication are applicable codes,to problems secret sharing,in multi-attribute and secure auctionsmultiparty [6–9]. computation.In 2006, Suzuki These et al. [10] methods proposed are intendeda protocol to for solve multi-attribute security and auctions other issuesthat required in online a trustedauctions, authority. such as In the 2007, privacy Shih of et bids, al. [11] the proposed privacy of a themethod bidders’ with identities, a shared andhash the chain effi cientto deal operation with multipleof the auction.items in However,an online mostauction, of these but it methods was not are applicable used to solvefor multi-attribute the above issues auctions. of single-attribute In 2008, Parkesauctions. et al. [12] Only used a few homomorphic of the related encryption research in results a multiple-item are applicable auction to problems to protect in the multi-attribute privacy of theauctions bids. However, [6–9]. In 2006,it still Suzuki was not et al. suitable [10] proposed for multi-attribute a protocol for auctions. multi-attribute In 2009, auctions Xiong that et al. required [1] proposeda trusted a ring authority. signature-based In 2007, Shih auction et al. to [11 protect] proposed bidders’ a method identities with in a the shared forward hash auction, chain to but deal the with implementationmultiple items ofin their an onlineproposal auction, would butrequire it was a large not applicablecomputational for multi-attribute cost. In 2011, Srinath auctions. et al. In [13] 2008, proposedParkes etthe al. involvement [12] used homomorphic of a trusted third encryption party to in protect a multiple-item the privacy auction of bids. to protectHowever, the since privacy sealedof the bids bids. must However, be opened it still at the was end not of suitable the auct forion multi-attribute to compute a auctions.scoring function, In 2009, their Xiong privacy et al. [1] cannotproposed be fully a ring protected. signature-based Also in 2011, auction Srinath to protect et al. [14] bidders’ extended identities Parkes in et the al.’s forward [12] homomorphic auction, but the encryption-basedimplementation protocol of their proposalto a mult wouldi-attribute require protocol, a large but computational the auctioneer cost. still In had 2011, to Srinathopen the et bids al. [13 ] at proposedthe end theof the involvement auction. ofIn aother trusted words, third partythe privacy to protect of the the privacy bid with of bids. their However, method since is still sealed compromised.bids must be In opened 2012, at Xiong the end et of al. the [15] auction proposed to compute a revocable a scoring ring function, signature their to privacy protect cannot bidders’ be fully privacy,protected. but it Also was inproven 2011, Srinathto be vulnerable et al. [14] to extended DoS attack. Parkes In et2013, al.’s Chang [12] homomorphic et al. [5] proposed encryption-based a secure Englishprotocol auction to a multi-attributesystem with an protocol,on-shelf phase but the in auctioneer order to improve still had Xiong to open et al.’s the bids[15] atproposal, the end but of the theauction. new system In otherhad a words,linkability the defect privacy that of meant the bid the with attacker their could method link isdifferent still compromised.