Álvaro Zavala, Leonel Maye, Christian Pleitez, Marvin Guillén
{"title":"Secure cryptographic protocol applied to the process of public tendering for contracting services","authors":"Álvaro Zavala, Leonel Maye, Christian Pleitez, Marvin Guillén","doi":"10.1109/CONCAPANXXXIX47272.2019.8976965","DOIUrl":null,"url":null,"abstract":"A tender is a regulated process through which an organization publicly discloses a contract, requests offers that satisfy it, evaluated these offers and selects one of them based on defined criteria. This article stablishes the necessary requirements in a secure tendering protocol, a proposal is performed using cryptographic primitives and the protocol is verified if it complies correctly with the security functions through an implementation in Maple mathematical software. The main objective is to maintain the integrity, authentication, non-repudiation and confidentiality of the documents involved as appropriate.","PeriodicalId":272652,"journal":{"name":"2019 IEEE 39th Central America and Panama Convention (CONCAPAN XXXIX)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 39th Central America and Panama Convention (CONCAPAN XXXIX)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONCAPANXXXIX47272.2019.8976965","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
A tender is a regulated process through which an organization publicly discloses a contract, requests offers that satisfy it, evaluated these offers and selects one of them based on defined criteria. This article stablishes the necessary requirements in a secure tendering protocol, a proposal is performed using cryptographic primitives and the protocol is verified if it complies correctly with the security functions through an implementation in Maple mathematical software. The main objective is to maintain the integrity, authentication, non-repudiation and confidentiality of the documents involved as appropriate.