Journal on Communications ›› 2020, Vol. 41 ›› Issue (9): 77-91.doi: 10.11959/j.issn.1000-436x.2020121
• Papers • Previous Articles Next Articles
Jiaqi WANG1,Ning LU1,2(),Qingfeng CHENG3,4,Zhaoxia WU5,Wenbo SHI6
Revised:
2020-05-27
Online:
2020-09-25
Published:
2020-10-12
Supported by:
CLC Number:
Jiaqi WANG,Ning LU,Qingfeng CHENG,Zhaoxia WU,Wenbo SHI. Privacy-preserving multi-attribute reverse spectrum auction scheme[J]. Journal on Communications, 2020, 41(9): 77-91.
[1] | AL-KINANI A , WANG C X , ZHOU L ,et al. Optical wireless communication channel measurements and models[J]. IEEE Communications Surveys & Tutorials, 2018,20(3): 1939-1962. |
[2] | CHOWDHURY M Z , HASAN M K , SHAHJALAL M ,et al. Opportunities of optical spectrum for future wireless communications[C]// 2019 International Conference on Artificial Intelligence in Information and Communication. Piscataway:IEEE Press, 2019: 4-7. |
[3] | ZHAO F , TANG Q . A KNN learning algorithm for collusion-resistant spectrum auction in small cell networks[J]. IEEE Access, 2018,6: 45796-45803. |
[4] | YADAV I , KULKARNI A A , KARANDIKAR A . Strategy-proof spectrum allocation among multiple operators[C]// 2019 IEEE Wireless Communications and Networking Conference. Piscataway:IEEE Press, 2019: 1-6. |
[5] | 万屹 . 全球首次频谱资源激励拍卖带给我们的启示[J]. 中国无线电, 2017(11): 37-38. |
WAN Y . Enlightenment from the world’s first spectrum resource incentive auction[J]. China Radio, 2017(11): 37-38. | |
[6] | 余莉娟 . 激励拍卖:利用市场手段加速频谱转让的新手段[J]. 世界电信, 2015(12): 50-53. |
YU L J . Incentive auction:new means to use market to accelerate spectrum transfers[J]. World Telecommunications, 2015(12): 50-53. | |
[7] | TEICH J E , WALLENIUS H , WALLENIUS J ,et al. A multi-attribute e-auction mechanism for procurement:Theoretical foundations[J]. European Journal of Operational Research, 2006,175(1): 90-100. |
[8] | GOLDREICH O . On the foundations of cryptography[M]. NewYork: ACM BooksPress, 2019: 411-496. |
[9] | BRICKELL J , SHMATIKOV V . Privacy-preserving graph algorithms in the semi-honest model[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2005: 236-252. |
[10] | FOUQUE P A , POUPARD G , STERN J . Sharing decryption in the context of voting or lotteries[C]// International Conference on Financial Cryptography. Berlin:Springer, 2000: 90-104. |
[11] | PAILLIER P , . Public-key cryptosystems based on composite degree residuosity classes[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1999: 223-238. |
[12] | SHOUP V , . Practical threshold signatures[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2000: 207-220. |
[13] | BEIL D R , WEIN L M . An inverse-optimization-based auction mechanism to support a multiattribute RFQ process[J]. Management Science, 2003,49(11): 1529-1545. |
[14] | SCHARTNER P , SCHAFFER M . Unique user-generated digital pseudonyms[C]// International Workshop on Mathematical Methods,Models,and Architectures for Computer Network Security. Berlin:Springer, 2005: 194-205. |
[15] | TZENG W G . Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters[J]. IEEE Transactions on Computers, 2004,53(2): 232-240. |
[16] | BAUDRON O , FOUQUE P A , POINTCHEVAL D ,et al. Practical multi-candidate election system[C]// Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing. New York:ACM Press, 2001: 274-283. |
[17] | DAMG?RD I , JURIK M . A generalisation,a simplication and some applications of paillier’s probabilistic public-key system[C]// International Workshop on Public Key Cryptography. Berlin:Springer, 2001: 119-136. |
[18] | FIAT A , SHAMIR A . How to prove yourself:practical solutions to identification and signature problems[C]// Conference on the Theory and Application of Cryptographic Techniques. Berlin:Springer, 1986: 186-194. |
[19] | PAN M , SUN J , FANG Y . Purging the back-room dealing:secure spectrum auction leveraging paillier cryptosystem[J]. IEEE Journal on Selected Areas in Communications, 2011,29(4): 866-876. |
[20] | HUANG Q , TAO Y , WU F . Spring:a strategy-proof and privacy preserving spectrum auction mechanism[C]// 2013 Proceedings IEEE INFOCOM. Piscataway:IEEE Press, 2013: 827-835. |
[21] | WU F , HUANG Q , TAO Y ,et al. Towards privacy preservation in strategy-proof spectrum auction mechanisms for noncooperative wireless networks[J]. IEEE/ACM Transactions on Networking, 2014,23(4): 1271-1285. |
[22] | HUANG H , LI X Y , SUN Y ,et al. PPS:privacy-preserving strategyproof social-efficient spectrum auction mechanisms[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,26(5): 1393-1404. |
[23] | CHEN Z , CHEN L , HUANG L ,et al. Towards secure spectrum auction:both bids and bidder locations matter:poster[C]// Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York:ACM Press, 2016: 361-362. |
[24] | SRINATH T R , SINGH M P , PAIS A R . Anonymity and verifiability in multi-attribute reverse auction[J]. arXiv Preprint,arXiv:1109.0359, 2011 |
[25] | SRINATH T R , KELLA S , JENAMANI M ,et al. A new secure protocol for multi-attribute multi-round e-reverse auction using online trusted third party[C]// International Conference on Emerging Applications of Information Technology. Piscataway:IEEE Press, 2011: 149-152. |
[26] | NJAH H , JAMOUSSI S , MAHDI W . Deep Bayesian network architecture for big data mining[J]. Concurrency and Computation:Practice and Experience, 2019,31(2):e4418. |
[27] | WANG J , KARUPPIAH M , KUMARI S ,et al. A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification[J]. Journal of Intelligent & Fuzzy Systems, 2019,doi:10.3233/JIFS-169979. |
[28] | WANG S G , XU P , XU X H ,et al. TODA:truthful online double auction for spectrum allocation in wireless networks[C]// 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum. Piscataway:IEEE Press, 2010: 1-10. |
[29] | CHEN Z , HUANG L , LI L ,et al. PS-TRUST:provably secure solution for truthful double spectrum auctions[C]// IEEE INFOCOM 2014-IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2014: 1249-1257. |
[30] | CHEN Z , WEI X , ZHONG H ,et al. Secure,efficient and practical double spectrum auction[C]// 2017 IEEE/ACM 25th International Symposium on Quality of Service. Piscataway:IEEE Press, 2017: 1-6. |
[31] | WANG Q , HUANG J , CHEN Y ,et al. $ PROST $:privacy-preserving and truthful online double auction for spectrum allocation[J]. IEEE Transactions on Information Forensics and Security, 2018,14(2): 374-386. |
[32] | PAN M , ZHU X , FANG Y . Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer[J]. Wireless Networks, 2012,18(2): 113-128. |
[33] | CHEN Y , TIAN X , WANG Q ,et al. ARMOR:a secure combinatorial auction for heterogeneous spectrum[J]. IEEE Transactions on Mobile Computing, 2019,18(10): 2270-2284. |
[1] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[2] | Shengxing YU, Zhong CHEN. Efficient secure federated learning aggregation framework based on homomorphic encryption [J]. Journal on Communications, 2023, 44(1): 14-28. |
[3] | Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE. Privacy-preserving trajectory similarity computation method [J]. Journal on Communications, 2022, 43(11): 1-13. |
[4] | Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao. Privacy-preserving precise profile matching in mobile social network [J]. Journal on Communications, 2022, 43(11): 90-103. |
[5] | Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG. Privacy-preserving attribute ticket scheme based on mobile terminal with smart card [J]. Journal on Communications, 2022, 43(10): 26-41. |
[6] | Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN. Towards edge-collaborative, lightweight and privacy-preserving classification framework [J]. Journal on Communications, 2022, 43(1): 127-137. |
[7] | Yousheng ZHOU,Chang TAN,Fei TANG. Multi-dimensional secure query scheme for fog-enhanced IIoT [J]. Journal on Communications, 2020, 41(8): 175-186. |
[8] | Jiayin LI,Wenzhong GUO,Xiaoyan LI,Ximeng LIU. Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic [J]. Journal on Communications, 2020, 41(7): 73-83. |
[9] | Ming LI,Xiaopeng YANG,Hui ZHU,Fengwei WANG,Qi LI. Efficient and privacy-preserving online face authentication scheme [J]. Journal on Communications, 2020, 41(5): 205-214. |
[10] | Shaohu DING,Jichao XIE,Peng ZHANG,Liming PU,Yunjie GU. Dynamic migration method of key virtual network function based on risk awareness [J]. Journal on Communications, 2020, 41(4): 102-113. |
[11] | Weijin JIANG, Yang WANG, Xiaoliang LIU, Sijian LYU. Multi-attribute spectral clustering emergency detection based on word correlation feature [J]. Journal on Communications, 2020, 41(12): 193-204. |
[12] | Xinyu WANG,Ben NIU,Fenghua LI,Kun HE. Risk assessing and privacy-preserving scheme for privacy leakage in APP [J]. Journal on Communications, 2019, 40(5): 13-23. |
[13] | Xiangyu WANG,Jianfeng MA,Yinbin MIAO. Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user [J]. Journal on Communications, 2019, 40(2): 31-39. |
[14] | Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS [J]. Journal on Communications, 2018, 39(5): 134-142. |
[15] | Jiale ZHANG,Yanchao ZHAO,Bing CHEN,Feng HU,Kun ZHU. Survey on data security and privacy-preserving for the research of edge computing [J]. Journal on Communications, 2018, 39(3): 1-21. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|