Research Article  Open Access
Li Li, Jiayong Liu, Peng Jia, "SPCTR: Sealed AuctionBased Procurement for Closest PreTender with Range Validation", Security and Communication Networks, vol. 2020, Article ID 8872617, 12 pages, 2020. https://doi.org/10.1155/2020/8872617
SPCTR: Sealed AuctionBased Procurement for Closest PreTender with Range Validation
Abstract
Over the past decades, there have existed extensive research works on the designs of the closest pretender procurement bidding. However, most solutions for the closest pretender only target at economic benefits while omitting the problem of bid privacy leakage. Moreover, existing works fail to provide approaches with adequate security and high efficiency. In this paper, for the first time, we propose SPCTR, a sealedprice auctionbased procurement bidding system for the closest pretender with range validation. SPCTR allows a range validation for a supplier’s bid without leaking the secret bid. Besides, SPCTR achieves a sealedprice comparison with the pretender to find the closest pretender bid. Compared with previous works, SPCTR provides strong privacy protection for the bids of suppliers without sacrificing high efficiency. SPCTR is constructed based on carefully designed cryptographic tools with generality and simplicity which enable various operations on the encrypted values, and these tools can be easily applied to other contexts. We not only formally prove that SPCTR is secure against semihonest adversaries but also comprehensively analyze the efficiency. Experimental results validate that SPCTR achieves procurement bidding with light computation time and communication cost in practice.
1. Introduction
1.1. Motivation
Nowadays, Internet communication has made a huge impact on supply chain management and facilitates the ample participation of motivated suppliers. As one aspect of supply chain management, procurement is a necessary process for a company to obtain the manufacturing materials. For leveraging the competitive nature of suppliers to keep the procurement cost reasonable, the auction mechanism is introduced in the procurement. Pretender bidding, a popular type of auctionbased procurement bidding, is widely used as a standard business requirement for many organizations in recent years [1, 2]. In what follows, the process of pretender bidding is briefly described. First, as per the specific project, the procurement manager will generate some critical factors including the lowest bid, the highest bid, and the pretender. Then, the procurement manager will issue the lowest bid and the highest bid while keeping the pretender private to himself. Later on, suppliers submit their bids required to be validated in the range between the lowest bid and the highest bid. Finally, the supplier with the closest pretender bid will be claimed as the winner of the bidding system.
Unfortunately, for the concerns of privacy, the procurement bidding system is vulnerable. For example, the thirdparty procurement manager is not always trustworthy and suppliers are competitive to obtain the bidding. Thus, they probably interfere with a normal bidding system by soliciting some commercial secret values of suppliers like bids. Then, the procurement manager can adjust the pretender for maximum profit rather than the true valuation of a project next time by monitoring the previous bids of suppliers. Moreover, by learning the historical bids of other suppliers, a supplier can submit a bid that may be closest to the pretender with high probability. Hence, providing strong privacy protection for suppliers’ bids is of great importance in the realistic procurement bidding system.
1.2. Challenges and Solutions
To design such a privacypreserving closest pretender procurement bidding system, we have to face the following two challenges. The first challenge is how to design a privacypreserving closest pretender procurement bidding system which provides privacy protection for the secret bids while the fundamental functions of the system are maintained. Huang et al. presented a secure auction mechanism for secondary spectrum markets based on BGN cryptosystem [3]. However, the involved bilinear pairing operations make the scheme computationally expensive. Blass and Kerschbaum proposed a secure auction for blockchain by leveraging GM encryption [4]. Later on, a solution of fully private auction seeking for the highest bid was presented in [5]. These works provide good protection for bid privacy but also face the challenge of computation efficiency. More recently, Wang et al. presented privacypreserving truthful double online auction for heterogeneous spectrum [6]. In this work, garbled circuits are used for bid grouping rather than bid comparison [7]. To this end, we employ lightweight cryptographic primitives, such as the Paillier cryptosystem and garbled circuits to the original system. On the one hand, these cryptographic tools allow our scheme to output the correct result. For example, in the original auction, the supplier with the bid is closest to the pretender so that the winner is . In our privacypreserving system, despite the fact that bids are encrypted, the winner is still and will not change. On the other hand, they can ensure that the private bid of a supplier is well protected and will not be leaked to other suppliers and the procurement manager.
The second challenge is how to demonstrate whether a secret bid is in a specified range or not, without revealing the secret bid. To cope with the second challenge, the technology of range proof is adopted in this paper. Roughly speaking, the range proof technology is categorized into two types: decompositioncommitment range proof [8] and signaturebased range proof [9]. However, the decompositioncommitment range proof is typically computationally expensive due to bit decomposition and commitment generation. In contrast, the signaturebased proof only requires a constant number of group elements to be exchanged irrespective of the number of bits of the secret value. Chaabouni et al. presented a more efficient variant of signaturebased range proof in [10]. In this work, first, the verifier sends the prover all the signatures of elements in the range, and then the prover proves that its secret value matches one of these signatures. However, the communication complexity depends on the size of the range. Improvement was made in [9], and only a constant number of elements are exchanged in the proof. Hence, for the consideration of a large number of bids, signaturebased range proof is taken as our range proof technology.
All in all, our main contributions are listed as follows:(i)To our knowledge, we firstly propose a privacypreserving closest pretender procurement bidding system. That means a fully secure procurement bidding system is carried out without revealing suppliers’ private bids. Based on the delicately designed cryptographic tools, we achieve the phase of bid comparison in a privacypreserving manner to ensure the privacy of bids.(ii)We propose a signaturebased range proof to achieve the range validation. The commitchallengeverify process allows the bids submitted by the suppliers to be validated in a specified range (lying between the lowest bid and the highest bid). Also, the validation process will not leak the secret bids of suppliers.(iii)We present a thorough theoretical analysis of SPCTR for the concerns of both security and efficiency. At last, we construct a prototype to conduct extensive experiments to further validate the practicality in the computation time and communication cost.
The remainder of this paper is organized as follows. The system model, the threat model, and design goals are presented in Section 2. Section 3 introduces the preliminaries and the necessary mathematical notations. Section 4 presents building blocks of SPCTR, including ciphertext multiplication and secure minimum value selection. In Section 5, we elaborately depict the two phases of SPCTR: BidRPrf and CloPCmp. In Section 6, we present the security and efficiency analysis for SPCTR, followed by the performance evaluation in Section 7. At last, Section 9 concludes this paper.
2. Problem Statement
2.1. System Model
We consider the construction bidding project as our application scenario. The system model of SPCTR under this application scenario is depicted in Figure 1. The model is in terms of three entities, a procurement manager, a procurement agent, and suppliers. The functionalities of three entities are described, respectively, in the following: Procurement manager (PM): PM sets the lowest bid (), the highest bid (), and the pretender () for SPCTR. Therein, the lowest bid and the highest bid are public to each entity. SPCTR requires each bid submitted by each supplier to lie in the range of , whereas the pretender () is a secret value that only PM knows it. Furthermore, the bid which is nearest to the pretender will be the winner of SPCTR. After a secure interaction between PM and the procurement agent, PM declaims the final winner of the bidding and returns this result to suppliers. Suppliers: in the bidding project, suppliers wish to compete for undertaking the project. First, these suppliers formulate the budgets as their bids. Afterward, the suppliers should prove to PM that their bids lie in the range of without disclosing their bids to PM. After accomplishing the range validation, suppliers encrypt their bids by a cryptosystem and send the encrypted bids to PM. Procurement agent (PA): in [3, 6], PA is presented to assist PM to promote the secure bidding. To be specific, PA will cooperate with PM to find the bid which is closest to the pretender. PA generates a key pair including a private key and a public key. PA holds the private key by itself and publishes the public key to other parties. Assumptions: suppliers are assumed to submit their true bids faithfully. This means any supplier cannot falsify a bid which is in the range to replace the original bid which is not in the range . Also, suppliers are assumed to submit the same bids in the different phases of SPCTR. Finally, we assume PM and PA do not collude with each other to manipulate the bidding process and determine the final winner.
2.2. Attack Model
In our attack model, we consider PM, PA, and suppliers to be semihonest. This implies that they follow the stipulated rules strictly but they are curious about other entities’ sensitive information (e.g., their bids) and will attempt to obtain the information from the view of executing the bidding process. We consider a passive adversary under semihonest setting.
Similar to the general security definition in [11, 12], we use the simulationbased proof technique to define security [13]. Let be a set of involved parties who execute an algorithm to compute a function . is denoted as the input and is denoted as the output. Let be a corrupted subset and be auxiliary information during executing , e.g., the random numbers selected by , and the view of be . is a simulator to generate a transcript of the scheme that takes as the input and as the output.
Definition 1. An algorithm is defined to be secure against an adversary if there exists a probabilistic polynomial time (PPT) simulator such that two distribution ensembles and are computationally indistinguishable, that is, .
In combination with the concretization of our scheme, we present a formal security definition against semihonest adversaries based on Definition 1.
Definition 2. (security). An algorithm is assumed to have Alice (resp. Bob) and compute (resp. ), where are inputs of Alice and Bob, respectively. Let (resp. ) denote Alice’s (resp. Bob’s) view during the execution of on the input of . This means (resp. ) are Alice’s (resp. Bob’s) input and auxiliary information, respectively, during executing , and (resp. ) is the output of Alice (resp. Bob). Then, the algorithm is secure against semihonest adversaries if there are probabilistic polynomial time (PPT) simulators and that make equation (1) hold.
2.3. Design Goals
In what follows, the design goals of our scheme are depicted. Correctness: in short, after the procurement bidding, the winning supplier returned by PM in our scheme should be the same as the one obtained in the original plaintext domain. Security: PM, PA, and other suppliers cannot obtain the secret bids of suppliers except for the bidding result. Lightweight: the cryptographic tools used in our scheme should be lightweight. That is, the computation time and communication cost should be acceptable in practice without sacrificing bid privacy.
3. Preliminaries
In this section, we introduce the necessary preliminaries of our scheme, including Paillier cryptosystem, zeroknowledge proofs of knowledge (ZKPK), and improved garbled circuit. Paillier cryptosystem is used to generate the key pair, encrypt, and decrypt messages. ZKPK is used to achieve range validation, and the improved garbled circuit is used to enable secure closest pretender comparison.
3.1. Paillier Cryptosystem
To provide the sealedbid property, the Paillier homomorphic encryption algorithm is adopted in our scheme [14]. A Paillier key pair consists of the private key and the public key . Having said this, the Paillier cryptosystem mainly consists of three parts including key generation, encryption, and decryption. The three parts are listed as follows: Key generation: first, two large prime integers and are selected. Let , ; then, the public key is . Let and ; then, the private key is . Encryption: for a plaintext message , we denote as its encrypted value. We select ; then, the encrypted value is computed by the following equation: Decryption: given the private key and , decryption is computed by equation (3) to obtain the plaintext . The Paillier cryptosystem possesses the following interesting properties including homomorphic addition and indistinguishability. Homomorphic addition: this operation allows a specific computation to be executed on ciphertexts and finally obtains a new ciphertext that can be decrypted to match the result of the computation executed directly on the plaintext. As per the homomorphic addition property of the Paillier cryptosystem, equations (4)–(6) hold, where and are plaintexts and is an integer. In the following context, for easy exposition, we leave out the mod operation without confusion. Indistinguishability: for a plaintext , if is encrypted twice to obtain and , respectively, then the probability that an adversary distinguishes and will only be negligible better than a random guess.
3.2. ZeroKnowledge Proofs of Knowledge
Zero knowledge (ZK) is termed as an interactive protocol in which a prover (Alice) tries to convince a verifier (Bob) about the validity of a statement without disclosing anything else beyond the fact itself [7]. In the following, the formal description of such a proof is given. For example, there exists a proof that , where . This expression explicitly denotes that the prover tries to convince the verifier with the statement of knowing by and . The variables remain private to the verifier, whereas the variables remain public to the verifier.
3.3. Oblivious Transfer
Oblivious transfer (OT) is one type of twoparty computing protocols where a sender (Alice) has an input, and then a receiver (Bob) learns something about the input but Alice does not know what Bob has learned [15]. In the 1outofN OT protocol, the sender has strings and the receiver can select one of strings without learning anything about the other strings. Also, the sender learns nothing about which input has been chosen by the receiver [16].
3.4. Garbled Circuit
In [17], Yao’s garbled circuits were firstly proposed for secure twoparty computation, and the circuits’ practice and security are demonstrated. The basic process for Yao’s garbled circuits is briefly described as follows. The circuit constructor (Alice) possesses the value and the evaluator (Bob) possesses the value , respectively, and they can jointly compute a specified function without disclosing any secret information beyond the result. Firstly, Alice converts a circuit that computes into an encrypted form by an algorithm GreateGC. Then, Alice sends the generated circuit and the garbled value to Bob. Bob explicitly computes the output of the circuit without disclosing any other information by an algorithm EvalGC. In the garbled circuit, the oblivious transfer protocol will be executed to transmit the values from Alice to Bob.
In the following, the circuits including subtraction circuit, comparison circuit, multiplexer circuit, and minimum value circuit used in our design will be introduced. Subtraction circuit: a subtraction circuit is used to subtract two bit integers and efficiently. The circuit consisting of a chain of 1 bit subtractors () is shown in Figure 2. Each 1 bit subtractor has carryin bits from the output of the last 1 bit subtractor and the bits . Furthermore, the 1 bit subtractor is composed of a 2input AND gate and four XOR gates. Comparison circuit: an integer comparison circuit is constructed for comparing two bit integers and to get the comparison result . We use equation (7) to express the integer comparison process. A comparison circuit can be decomposed to number of 1 bit comparators () in sequence. More specifically, the 1 bit comparator can be constructed by a 2input AND gate and three XOR gates. Multiplexer circuit (MUX): a bit multiplexer circuit is constructed to choose one of the bit integers and as output as per the selection bit . If , then the integer will be selected. Otherwise, the integer will be chosen. Usually, this circuit is a composed part to construct a minimum value circuit. The selection bit can derive from the boolean output of other garbled circuits, e.g., the comparison circuit. Minimum circuit: a minimum circuit can be used to select the minimum value and its index from a list of bit values . For the selected minimum value , it makes equation (8) hold. For example, the minimum value and its index of the list are and , respectively, since the leftmost minimum value 1 lies at the position of 1. Without loss of generality, we assume that the number of elements in the list is a power of two, and the maximum index can be represented with the value of .
The MIN circuit is constructed by a series of minimum blocks (min). The minimum value and its index will be determined by a tournamentlike way of using a tree of minimum blocks. It is straightforward to obtain that the depth of the tree is . In Figure 3, each minimum block consists of one comparison circuit and two multiplexer circuits. For each minimum block at the depth , the left part input of the block is and its index is . Also, the right part input of the block is and its index is . Through the minimum block, the output of and is computed.
We illustrate the function of the minimum block specifically. First, the comparison of and is achieved by a comparison circuit. There exists two cases. On the one hand, if is not bigger than , then the output of the comparison circuit is 0. The minimum value and its index are chosen as the output of and according to their corresponding multiplexer circuits. On the other hand, if is bigger than , then the output of the comparison circuit is 1. Hence, the minimum value and its index are selected as and .
4. Building Blocks
Before presenting our design, we first introduce the composed building blocks for our scheme. These building blocks are constructed based on the secure interaction between two parties, Alice and Bob, in which we assume only Bob owns the private key for decryption in the Paillier cryptosystem.
4.1. Ciphertext Multiplication
Given two bit values and , their encrypted forms are and , respectively. By using the homomorphic property of Paillier encryption, the encrypted form of can be obtained. We use the technology of random mask to provide a statistical security [18]. First Alice blinds and with two bit values and , respectively, and sends and to Bob. Bob decrypts and to obtain and . Then, Bob computes and reencrypts . Afterward, Bob sends to Alice. Finally, Alice computes according to the following equation:
4.2. Secure Minimum Value Selection
As shown in Figure 4, to securely select the minimum value and its index from a list of encrypted values , Alice first generates a minimum circuit consisting of subtraction circuits and a minimum circuit using GreateGC and gets the garbled values of random numbers . Then, Alice sends the garbled values and the blinded ciphertexts to Bob. Afterward, Bob invokes the oblivious transfer protocol and executes decryption. Then, Bob gets the garbled values . Finally, EvalGC is leveraged to evaluate the garbled circuit created by GreateGC.
A SUB circuit is used to get the difference between two garbled values, e.g., and . Then, the bit value of the results will be taken as the inputs of the minimum circuit. And the index of the minimum value is obtained as the output. Finally, the result is sent to Alice. The process of secure minimum value selection is described in Algorithm 1.

In the following context, we specify for Alice to get the index of the minimum value from a list of encrypted values directly.
5. Our Scheme
Our procurement bidding system consists of two phases: bids’ range proof validation (BidRPrf) and secure closest pretender comparison (CloPCmp). BidRPrf is used for PM to validate whether the suppliers’ bids are in the specified range or not. Moreover, CloPCmp is used for PM to choose the index of the supplier whose bid is closest to the pretender securely.
We use the signaturebased proof technology to achieve the range proof. For each bid, it is required to be validated in the range between the lowest bid and the highest bid . First, PM generates a signature for each element in . Then, PM picks and computes . Note that is the public key of the Paillier cryptosystem. These values are precomputed for the suppliers publicly to download and use in the range proof below. We call the precomputing process as PreCmp.
5.1. Bids’ Range Proof
To prove a bid , Algorithm 2 is designed on the basis of ZKPK. First, a commitment of the bid and the values are generated by the supplier. These values are related to . Then, are sent to PM. After receiving these values, PM sends a challenge to the supplier. Afterward, the supplier generates the proof composed of and sends the proof to PM. Finally, PM verifies the proof and decides whether to accept or reject the proof. Note that the supplier does not need to compute the predetermined value . The value has been precomputed for public downloading.

5.2. Secure Closest PreTender Comparison
The highlevel structure of closest pretender comparison is described in Figure 5. In order to find the closet pretender supplier securely, first, we should measure the distance between the bid and the pretender for each supplier, and then we have to find the minimum absolute value of these distances. This means we devote to find the minimum value of . For the sake of privacy preservation, the minimum value selection of is required to be achieved on the ciphertexts. However, there does not exist an efficient method to compute the minimum value from . Therefore, we transform the problem to compute the minimum value from the ciphertexts of . Using the homomorphic property of the Paillier cryptosystem, Algorithm 3 is designed to achieve closest pretender comparison securely.

The details of CloPCmp are depicted in Algorithm 3. PM has a list of encrypted bids and the encrypted pretender while PA keeps the key pair . PM selects masking random integers to get and sends to PA for decryption. PA decrypts them to get and computes . Then, PA reencrypts each and sends each to PM. Subsequently, with no need to decrypt them, based on the equation of , PM can remove the masking numbers to get through the homomorphic property of the Paillier cryptosystem by . Finally, the index of the minimum value can be selected through invoking MinValSel which is presented in Algorithm 1.
6. Theoretical Analysis
6.1. Security Analysis
In this section, the security proof is formally proved. In what follows, Lemma 1 is introduced to prove that SPCTR is secure against semihonest adversaries based on the security definition of Definition 2 that is defined in Section 2.2.
Lemma 1. Assume Bob generates the key pair for the homomorphic cryptographic system and issues the public key for Alice. Then, Alice and Bob run the algorithm . All the ciphertexts transmitted from Alice to Bob are uniformly distributed and independent of Alice’s inputs. And all the messages transmitted from Bob to Alice are encrypted by the cryptographic system. Therefore, the algorithm is secure against semihonest adversaries.
Proof. To prove Lemma 1, we should consider two cases, in which the party that is corrupted by the adversary is different. In the first case, Alice is corrupted, and in the second case, Bob is corrupted. In each case, we can finally infer that equation (1) holds. Therefore, we conclude that the algorithm is secure against semihonest adversaries. In [6], we can see more details about this proof.
Theorem 1. BidRPrf (Algorithm 2) is secure against semihonest adversaries.
Proof. It is straightforward to demonstrate the security of BidRPrf against semihonest adversaries since it is constructed based on ZKPK. In the context of ZKPK, the corrupted party (the verifier) has no private input nor output. Thus, the only task for the simulator is to generate a view that is indistinguishable from the real execution. Having said this, it is easy for us to pick some random values and compute new values which are indistinguishable from . In addition, due to the property of the semihonest model which follows the protocol rules exactly, the values can be validated successfully. Therefore, BidRPrf is secure against semihonest adversaries.
Theorem 2. MinValSel (Algorithm 1) is secure against semihonest adversaries.
Proof. Messages which are transmitted between Alice and Bob are encrypted by the semantically secure Paillier cryptosystem and are uniformly distributed in the ciphertext space . The result of MinValSel is revealed to determine the index of the minimum value on the ciphertexts. Note that the random masked technique we leverage will not thwart the security guarantees. In addition, the garbled circuits (e.g., the minimum circuit and the comparison circuit) which are adopted in this paper have been proved to be secure against semihonest adversaries in [19]. Thus, based on the foundation of Lemma 1 and sequential composition theory [20], MinValSel is secure against semihonest adversaries.
Theorem 3. CloPCmp (Algorithm 3) is secure against semihonest adversaries.
Proof. In Algorithm 3, messages are exchanged between PM and PA. By masking with some random values, messages that are sent from PM to PA include , which are uniformly distributed in the ciphertext space . Messages that are sent from PA to PM include , which are encrypted by the semantically secure Paillier cryptosystem. Moreover, MinValSel has been proved to be secure against semihonest adversaries. Therefore, on the basis of Lemma 1 and sequential composition theory [20], CloPCmp is secure against semihonest adversaries.
6.2. Efficiency Analysis
We individually measure each phase of SPCTR to derive the computation and communication complexities and then we measure the overall computation and communication complexities. Bids’ range proof: the computation and communication complexities of this phase are mainly derived from Algorithm 2. This phase is executed by the suppliers and PM to validate whether the bids are in the required range. In terms of the computation overhead from each supplier, besides the regular modular operations, it requires 8 exponentiation operations, 3 multiplication operations, and 3 subtraction operations. Additionally, for PM, it requires 6 exponentiation operations. For the concerns of communication overhead, each supplier and PM need to exchange 7 values. Hence, the computation and communication complexities in this phase are both . Secure closest pretender comparison: in this phase, the computation and communication complexities are mainly generated from Algorithm 3, in which PM and PA interact with each other to determine the closest pretender supplier. Algorithm 3 includes three iterations which are composed of several specific operations (e.g., encryption, multiplication, exponentiation, decryption, etc,.) and one operation of invoking the function of MinValSel. Moreover, we get the observation that number of values () have been transmitted between PM and PA. Therefore, the computation and communication complexities in this phase are also . All in all, the computation and communication complexities of SPCTR are .
7. Experimental Evaluation
7.1. Parameter Settings
To demonstrate the practicality in the real world, the core cryptographic operations of SPCTR are prototypically implemented by Java. All the experiments were executed in a laptop with Intel i76560U CPU, 2.20 GHz clock. The parameters of SPCTR are sized as follows. The Paillier cryptosystem is implemented with a 1024bit modulus, and 80bit wire labels are used for garbled circuits.
We are mainly concerned with two metrics: the computation time and communication cost in the performance evaluation. We set the system parameters as follows. The number of suppliers varies from 200 to 2000. The lowest bid spans from 50 to 500 and the highest bid spans from 1000 to 10000. Moreover, the bit length of a bid is set from 32 to 82. The bit length of a masked random value is 30 bit longer than so that varies from 62 to 112. We set the default values of suppliers , the lowest bid , the highest bid , and the bit length as 200, 100, 10000, and 32, respectively. All experimental results are based on the average values of 10 runs. Moreover, we compare the experimental results of our scheme with other SOTA (stateoftheart) works including SDSA [21] and PSTAHES [6].
7.2. Computation Time and Communication Cost
In Figure 6, when the number of suppliers is 1000, the total computation time and communication cost are 20.91 s and 1236 kB respectively, which are much superior to the costs in SDSA and PSTAHES. To be specific, the computation time and communication cost of SDSA are nearly 57 s and 88 MB. Besides, the computation time and communication cost of PSTAHES are about 149 s and 74 MB. Therefore, in comparison with SDSA and PSTAHES, the computation time and communication costs are proved to be significantly reduced with the same strong privacy protection.
(a)
(b)
It is shown in Figure 7 that fixing the following factors, including the number of suppliers , the pretender , and the bid range , we select in pairs. To keep the same statistical security level, the bit length of is 30 bit longer than . Therefore, for a bit and a bit , the masked value provides a statistical security of for . In the experiments, the bit lengths are varied from (32, 62) to (82, 112). We observe that the computation time increases almost linearly with the bit lengths since the bit length increment affects the running time of operating on the bids, e.g., bid range validation in BidRPrf and ciphertext multiplication in CloPCmp. However, the communication cost almost remains the same with the bit lengths . This result is consistent with the aforementioned analysis that each supplier and PM need to exchange 7 values in BidRPrf. Moreover, in CloPCmp, the size of data is transmitted between PM and PA. In the experiments which are implemented using Java, we use a constant number of BigInteger to store these values. Therefore, the communication cost is a constant irrespective of the bit lengths .
(a)
(b)
In Figure 8, we observe two main results. First, fixing the factor of the bid range, the computation time and communication cost increase linearly with the number of suppliers . However, fixing the value of , the computation time and communication cost are slightly affected by the bid range. Therefore, we validate that it is the number of suppliers rather than the bid range that determines the cost of validating a bid whether it is in a specified range or not.
(a)
(b)
8. Related Work
8.1. Range Proof
In the decompositioncommitmentbased range proof, the secret is decomposed into individual bits. Then, we demonstrate the commitments of these bits implying the number in the range [22, 23]. Instead of binary decomposition, the works of multibase decomposition are presented. The secret is decomposed in base ( is a chosen integer). Then, commitments of these ary digits are constructed to prove that each committed digit is indeed a digit in base [24, 25]. Although progress has been made so far, decompositioncommitmentbased range proof is computationally expensive. Alternately, the idea of signaturebased range proof is using the signatures of all the integers in a public interval [26, 27].
8.2. SealedPrice Auction
Sealedprice auction is one common form of secure computations [28–30]. Since the seminal Yao’s work in 1982 [17], there is a surge of extensive research endeavors in the sealedprice auction design [3–5]. In [6], garbled circuits are proposed to resolve the problem of secure sealedbid comparison. In [7], Kolesnikov et al. constructed a secure comparison garbled circuit. To extend more secure implementations of garbled circuits, a minimum value selection circuit is proposed in [11].
9. Conclusion
In this paper, we have presented SPCTR, the first sealedbid auctionbased procurement bidding system with range validation. Different from previous works, SPCTR provides full privacy protection for the bid comparison while enabling the bid range validation without leaking the secret bids. SPCTR is constructed by leveraging carefully designed secure cryptographic tools. Then, security analysis and performance analysis are presented. Later on, extensive experiments are conducted to verify the practicality of SPCTR. In comparison with the previous works, SPCTR can achieve sealedbid comparison and range validation with much less computation time and communication cost.
Data Availability
The data used to support the findings of this study are included within the article.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This study was supported by the Sichuan Science and Technology Program (no. 2020YFG0076), Science and Technology Research Project of Chongqing Municipal Education Commission of China (KJ1601401), Science and Technology Research Project of Chongqing University of Education (KY201725C), Chongqing Electronics Engineering Technology Research Center for Interactive Learning, Chongqing Big Data Engineering Laboratory for Children, and Innovative Research Group of Higher Institutions in Chongqing (Research on key technology and application of big data analysis in children’s education).
References
 B. L. Oo, “Release of construction clients’ pretender cost estimates: an experimental study,” Construction Economics and Building, vol. 17, no. 4, pp. 37–47, 2017. View at: Publisher Site  Google Scholar
 S. Hassim, R. Muniandy, A. H. Alias, and P. Abdullah, “Construction tender price estimation standardization (Tpes) in Malaysia,” Engineering, Construction and Architectural Management, vol. 25, no. 3, pp. 443–457, 2018. View at: Publisher Site  Google Scholar
 Q. Huang, Y. Gui, F. Wu, G. Chen, and Q. Zhang, “A general privacypreserving auction mechanism for secondary spectrum markets,” IEEE/ACM Transactions on Networking, vol. 24, no. 3, pp. 1881–1893, 2016. View at: Publisher Site  Google Scholar
 E.O. Blass and F. Kerschbaum, “Strain: a secure auction for blockchains,” in Computer Security, J. Lopez, J. Zhou, and M. Soriano, Eds., pp. 87–110, Springer International Publishing, Cham, Switzerland, 2018. View at: Google Scholar
 J. Ma, B. Qi, and K. Lv, “Fully private auctions for the highest bid,” in Proceedings of the ACM Turing Celebration Conference—China, ACM TURC’19, Chengdu, China, May 2019. View at: Publisher Site  Google Scholar
 Q. Wang, J. Huang, Y. Chen, X. Tian, and Q. Zhang, “Privacypreserving and truthful double auction for heterogeneous spectrum,” IEEE/ACM Transactions on Networking, vol. 27, no. 2, pp. 848–861, 2019. View at: Publisher Site  Google Scholar
 O. Goldreich, Foundations of Cryptography: Volume 1, Basic Tools, Cambridge University Press, Cambridge, UK, 2007.
 J. Camenisch, R. Chaabouni, and A. Shelat, “Efficient protocols for set membership and range proofs,” in Advances in Cryptology—ASIACRYPT 2008, J. Pieprzyk, Ed., pp. 234–252, Springer Berlin Heidelberg, Berlin, Germany, 2008. View at: Google Scholar
 T. Dimitriou, T. Giannetsos, and L. Chen, “Rewards: privacypreserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems,” Computer Communications, vol. 137, pp. 1–14, 2019. View at: Publisher Site  Google Scholar
 R. Chaabouni, H. Lipmaa, and A. Shelat, “Additive combinatorics and discrete logarithm based range protocols,” in Information Security and Privacy, R. Steinfeld and P. Hawkes, Eds., pp. 336–351, Springer Berlin Heidelberg, Berlin, Germany, 2010. View at: Google Scholar
 O. Goldreich, Foundations of Cryptography: Volume 2, Basic Applications, Cambridge University Press, Cambridge, UK, 2009.
 P. Bunn and R. Ostrovsky, Secure TwoParty kMeans Clustering, Association for Computing Machinery, New York, NY, USA, 2007.
 Y. Lindell, How to Simulate It—A Tutorial on the Simulation Proof Technique, Springer International Publishing, Cham, Switzerland, 2017.
 P. Paillier, “Publickey cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology—EUROCRYPT’99, J. Stern, Ed., pp. 223–238, Springer Berlin Heidelberg, Berlin, Germany, 1999. View at: Google Scholar
 M. Naor and B. Pinkas, “Computationally secure oblivious transfer,” Journal of Cryptology, vol. 18, no. 1, pp. 1–35, 2005. View at: Publisher Site  Google Scholar
 G. Brassard, C. Crépeau, and J.M. Robert, “Allornothing disclosure of secrets,” in Advances in Cryptology—CRYPTO’86, pp. 234–238, Springer, Berlin, Germany, 1986. View at: Google Scholar
 A. C. Yao, “Protocols for secure computations,” in Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982), pp. 160–164, IEEE, Chicago, IL, USA, November 1982. View at: Publisher Site  Google Scholar
 J. Yuan and S. Yu, “Efficient privacypreserving biometric identification in cloud computing,” in Proceedings of the 2013 IEEE INFOCOM, pp. 2652–2660, Turin, Italy, April 2013. View at: Publisher Site  Google Scholar
 V. Kolesnikov, A.R. Sadeghi, and T. Schneider, “Improved garbled circuit building blocks and applications to auctions and computing minima,” in Cryptology and Network Security, J. A. Garay, A. Miyaji, and A. Otsuka, Eds., pp. 1–20, Springer Berlin Heidelberg, Berlin, Germany, 2009. View at: Google Scholar
 C. Hazay and Y. Lindell, Efficient Secure TwoParty Protocols: Techniques and Constructions, Springer Science & Business Media, Berlin, Germany, 2010.
 Z. Chen, X. Wei, H. Zhong, J. Cui, Y. Xu, and S. Zhang, “Secure, efficient and practical double spectrum auction,” in Proceedings of the 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), pp. 1–6, Vilanova i la Geltru, Spain, June 2017. View at: Publisher Site  Google Scholar
 K. Li, R. Yang, M. H. Au, and Q. Xu, “Practical range proof for cryptocurrency monero with provable security,” in Information and Communications Security, S. Qing, C. Mitchell, L. Chen, and D. Liu, Eds., pp. 255–262, Springer International Publishing, Cham, Switzerland, 2018. View at: Google Scholar
 M. Fischlin, “A costeffective paypermultiplication comparison method for millionaires,” in Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographers Track at RSA, Ser. CTRSA 2001, SpringerVerlag, San Francisco, CA, USA, April 2001. View at: Google Scholar
 S. Canard, I. Coisel, A. Jambert, and J. Traoré, “New results for the practical use of range proofs,” in Public Key Infrastructures, Services and Applications, S. Katsikas and I. Agudo, Eds., pp. 47–64, Springer Berlin Heidelberg, Berlin, Germany, 2014. View at: Google Scholar
 S. Meiklejohn, C. C. Erway, A. Küpçü, T. Hinkle, and A. Lysyanskaya, “Zkpdl: a languagebased system for efficient zeroknowledge proofs and electronic cash,” in Proceedings of the 19th USENIX Conference on Security, USENIX Security 10, USA: USENIX Association, p. 13, Berkeley, CA, USA, August 2010. View at: Google Scholar
 I. Teranishi and K. Sako, “ktimes anonymous authentication with a constant proving cost,” in Public Key Cryptography—KC 2006, M. Yung, Y. Dodis, A. Kiayias, and T. Malkin, Eds., pp. 525–542, Springer Berlin Heidelberg, Berlin, Germany, 2006. View at: Google Scholar
 Y. Lindell, “Fast secure twoparty ecdsa signing,” in Advances in Cryptology—CRYPTO 2017, J. Katz and H. Shacham, Eds., pp. 613–644, Springer International Publishing, Cham, Switzerland, 2017. View at: Google Scholar
 A. Peter, E. Tews, and S. Katzenbeisser, “Efficiently outsourcing multiparty computation under multiple keys,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 2046–2058, 2013. View at: Publisher Site  Google Scholar
 X. Liu, R. H. Deng, K.K. Raymond Choo, and J. Weng, “An efficient privacypreserving outsourced calculation toolkit with multiple keys,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2401–2414, 2016. View at: Publisher Site  Google Scholar
 X. Liu, K.K. Raymond Choo, R. H. Deng, R. Lu, and J. Weng, “Efficient and privacypreserving outsourced calculation of rational numbers,” IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 1, pp. 27–39, 2018. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2020 Li Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.