JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2021, Vol. 56 ›› Issue (3): 23-27.doi: 10.6040/j.issn.1671-9352.0.2020.681

•   • Previous Articles     Next Articles

A safe auction algorithm for heterogeneous spectrum based on Paillier homomorphism

Zhao-xia WU(),Yi WANG   

  1. School of Statistics and Data Science, Xinjiang University of Finance and Economics, Urumqi 830012, Xinjiang, China
  • Received:2020-12-11 Online:2021-03-20 Published:2021-03-16

Abstract:

The rapid development of modern communication technology and the scarcity of the radio spectrum itself have brought new challenges to spectrum allocation. Electronic auctions have become a new opportunity for spectrum redistribution due to their high efficiency and fairness. The wireless spectrum auction mechanism has emerged as the times require. Security issues in the auction process hinder the practical application of spectrum auctions to a large extent. Based on this situation, a safe, effective, and practical heterogeneous spectrum secure auction algorithm is proposed, which combines the Paillier homomorphic encryption algorithm with the heterogeneous spectrum auction mechanism, so that the algorithm can obtain the correct winning bidder and its payment prices, bids and private information of bidders during the auction process can be strictly protected. The analysis proved the correctness and security of the algorithm.

Key words: auction algorithm, Paillier homomorphic encryption, heterogeneous spectrum, electronic auction

CLC Number: 

  • TP309

Fig.1

Buyer conflict graph"

1 CHEN Zhili , NI Tianjiao , ZHONG Hong , et al. Differentially private double spectrum auction with approximate social welfare maximization[J]. IEEE Transactions on Information Forensics and Security, 2019, 14 (5): 2805- 2818.
2 ZHAO Feng , ZHANG Yuyi , WANG Qiang . Multi-slot spectrum auction in heterogeneous networks based on deep feedforward network[J]. IEEE Access, 2018, 6, 45113- 45119.
doi: 10.1109/ACCESS.2018.2865437
3 ZHU Erzhou, ZHOU Zeren, MA Zhujuan, et al. Secure and efficient collaborative auction scheme for spectrum resource reallocation[C]//IEEE International Conference on Computer Supported Cooperative Work in Design. [S. l. ]: IEEE, 2018.
4 巫朝霞, 王佳琪. 一种无线单频谱安全拍卖算法[J]. 山东大学学报(理学版), 2018, 53 (11): 55- 59.
WU Zhaoxia , WANG Jiaqi . Wireless single spectrum secure auction algorithm[J]. Journal of Shangong University (Natural Science), 2018, 53 (11): 55- 59.
5 WANG Jiaqi , KARUPPIAH M , KUMARI S , et al. A privacy-preserving spectrum auction scheme using Paillier cryptosystem with public verification[J]. Journal of Intelligent & Fuzzy Systems, 2019, 36 (6): 1- 12.
6 CHEN Yanjiao , MA Zhuo , WANG Qian , et al. Privacy-preserving spectrum auction design: challenges, solutions and research directions[J]. IEEE Wireless Communications, 2019, 26 (5): 142- 150.
doi: 10.1109/MWC.2019.1900022
7 CHEN Zhili, WEI Xuemei, ZHONG Hong, et al. Secure, efficient and practical double spectrum auction[C]//IEEE/ACM International Symposium on Quality of Service. [S. l. ]: ACM, 2017: 1-6.
8 CHEN Zhili , CHE Ruihong , ZHONG Hong , et al. PATH: privacy-preserving auction for heterogeneous spectrum allocations[J]. Wireless Networks, 2019, 25 (4): 1763- 1776.
doi: 10.1007/s11276-017-1628-5
9 WANG Qian , HUANG Jing , CHEN Yanjiao , et al. Privacy-preserving and truthful double auction for heterogeneous spectrum[J]. IEEE/ACM Transactions on Networking, 2019, 27 (2): 848- 861.
doi: 10.1109/TNET.2019.2903879
[1] Zhao-xia WU,Jia-qi WANG. Wireless single spectrum secure auction algorithm [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(11): 51-55.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] DONG Ai-Jun, LI Guo-Jun, JU Jing-Song. List edge and list total colorings of planar graphs with adjacent triangles[J]. J4, 2009, 44(10): 17 -20 .
[2] . The optimized algorithm of optical threedimensional 
measurement for phaseshift technique
[J]. J4, 2009, 44(6): 40 -45 .
[3] HU Li-xia, ZHANG Jian-hua. Lie higher derivable mappings of triangular algebras at zero points[J]. J4, 2013, 48(4): 5 -9 .
[4] QI Ying-hua,QI Ai-qin . Periodic boundary value problems for differential equations with arguments[J]. J4, 2007, 42(7): 66 -71 .
[5] SUI Yunyun. The distribution of propositional truth degree in 5valued logic systems
associated with a nonlinear ordering true value set
[J]. J4, 2009, 44(1): 78 -82 .
[6] LI Meng-qiao, ZHAO Xian-feng*, SHU Yong-lu. Supercyclic subspace of a separable Banach space[J]. J4, 2012, 47(10): 102 -104 .
[7] ZHANG Rui, HOU Xu-guang*, GUO Zhan-sheng, ZHENG Hai, SHI Chao. Comparative analysis on isozymes between Haliotis discus hannai, Haliotis iris and their F1 hybrids[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 6 -11 .
[8] YAN Wei-rong, HONG Yu, ZHU Shan-shan, CHE Ting-ting, YAO Jian-min, ZHU Qiao-ming. Method of implicit discourse relation detection based on semantics scenario[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(11): 59 -67 .
[9] LV Wen1,2. Reflected BSDEs with a stochastic Lipschitz coefficient[J]. J4, 2011, 46(6): 79 -83 .
[10] ZHANG Wei, FU Yan-ling. New perturbation results and characterization on approximately dual g-frames in hilbert spaces[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(6): 49 -56 .