Font Size: a A A

Design And Implementation Of A Tracable Privacy Protection Auction Framework Based On Fabric

Posted on:2024-04-15Degree:MasterType:Thesis
Country:ChinaCandidate:Z F YinFull Text:PDF
GTID:2568306941984219Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the de velopment of Internet,electronic auction comes into being.While it brings convenience,there are issues of fairness and privacy security.With the rise of blockchain technology,blockchain has been widely used to solve the security problems caused by third-party auction institutions in electronic auction,but because of its open and transparent characteristics,it will pose a threat to the privacy of both auction parties.The research on privacy protection of electronic auction has involved a variety of auction forms.In the study on the privacy protection of the British auction and the Dutch auction,the existing schemes have some problems,such as incomplete privacy protection and the accuracy of auction results.However,there are the following problems in the study of American auction privacy protection:First,the protection method used by the existing scheme may affect the accuracy of the user’s bid.Second,in the stage of auction results,most of them are verified by the auctioneer themselves,which increases the workload of the auctioneer at the same time,the auction results cannot convince other competing buyers.In addition,most of the existing American auction research schemes aim at the first price of sealed auction.However,Vickrey’s auction which is compatible with incentives is not sufficiently studied.In addition,there are few researches on the tracking mechanism of malicious users in existing privacy auction schemes.This paper mainly studies an auction framework for privacy protection based on alliance chain.The goal is to provide traceable privacy protection for different forms of auctions that fit the auction business logic.The main work of this paper is as follows:1.According to the form of British auction and Dutch auction,a traceable privacy protection electronic auction scheme is proposed.Aiming at the problems of insufficient research on the privacy protection strategies of British auction and Dutch auction and the accuracy of auction results,the scheme uses the order preserving encryption algorithm to design a protection strategy to protect the privacy of users’ bidding.In order to make the order preserving encryption algorithm more suitable for auction scenario,the method of injecting ASCII code is used to improve the order preserving encryption algorithm.In addition,the scheme uses Shamir secret sharing technology to design a malicious user tracking mechanism,so as to realize the traceability of malicious users in a distributed decentralized system.2.Designed a traceable privacy protection electronic auction scheme based on the Vickrey auction form in American auction.In view of the problems of the existing American auction scheme,such as inaccurate results,auction results produced only by the auctioneer and insufficient research on the privacy protection of Vickrey’s auction,the scheme uses the Paillier encryption algorithm to protect bidding bids of competing buyers,and uses its addition homophily to produce auction results,which not only ensures the bidding will not be leaked,but also reduces the amount of calculation for the auctioneer.At the same time,the competitive buyer uses the zero-knowledge proof technology to prove the compliance of his bid,so as to ensure the normal progress of the auction process and ensure the correctness and fairness of the auction process.3.Design and implement privacy protection electronic auction system based on alliance chain.In this paper,the requirements of the system and the feasibility of implementation are analyzed,based on which the intelligent contract is developed and deployed,and the Hyperledger Fabric,Springboot in Java back-end framework and Vue framework are used to design and implement the system.
Keywords/Search Tags:privacy auction, Order preserving encryption algorithm, Malicious user tracking, Consortium Blockchain, Cryptographic algorithms and cryptographic protocols
PDF Full Text Request
Related items