{"title":"面向首次公开募股的合理竞价过程:基于同态计算和安全哈希函数的安全拍卖模型","authors":"Parthajit Roy, A. Roy","doi":"10.1504/IJEF.2018.10013336","DOIUrl":null,"url":null,"abstract":"There has been a large pool of research on the factors of initial public offerings (IPO) underpricing and investors' herd behaviour that influence investment decisions in general but no attention has been paid on the security aspects of IPO bidding and allocation processes to avoid unfair and fraudulent trading activities. This paper proposes a cryptographic model for secure auction of initial public offerings in Indian context. The paper synthesises IPOs by identifying the vulnerable points in it and proposes a homomorphic computation-based cryptographic model to secure it. The model uses a cryptographic hash function-based data hiding protocol for its auction process. The total infrastructure setup has also been discussed and the security measures are analysed.","PeriodicalId":38015,"journal":{"name":"International Journal of Electronic Finance","volume":"9 1","pages":"143-155"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Towards a rational bidding process of initial public offerings: a proposed model for secure auction based on homomorphic computation and secure hash functions\",\"authors\":\"Parthajit Roy, A. Roy\",\"doi\":\"10.1504/IJEF.2018.10013336\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There has been a large pool of research on the factors of initial public offerings (IPO) underpricing and investors' herd behaviour that influence investment decisions in general but no attention has been paid on the security aspects of IPO bidding and allocation processes to avoid unfair and fraudulent trading activities. This paper proposes a cryptographic model for secure auction of initial public offerings in Indian context. The paper synthesises IPOs by identifying the vulnerable points in it and proposes a homomorphic computation-based cryptographic model to secure it. The model uses a cryptographic hash function-based data hiding protocol for its auction process. The total infrastructure setup has also been discussed and the security measures are analysed.\",\"PeriodicalId\":38015,\"journal\":{\"name\":\"International Journal of Electronic Finance\",\"volume\":\"9 1\",\"pages\":\"143-155\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Electronic Finance\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJEF.2018.10013336\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Economics, Econometrics and Finance\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Electronic Finance","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJEF.2018.10013336","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Economics, Econometrics and Finance","Score":null,"Total":0}
Towards a rational bidding process of initial public offerings: a proposed model for secure auction based on homomorphic computation and secure hash functions
There has been a large pool of research on the factors of initial public offerings (IPO) underpricing and investors' herd behaviour that influence investment decisions in general but no attention has been paid on the security aspects of IPO bidding and allocation processes to avoid unfair and fraudulent trading activities. This paper proposes a cryptographic model for secure auction of initial public offerings in Indian context. The paper synthesises IPOs by identifying the vulnerable points in it and proposes a homomorphic computation-based cryptographic model to secure it. The model uses a cryptographic hash function-based data hiding protocol for its auction process. The total infrastructure setup has also been discussed and the security measures are analysed.
期刊介绍:
IJEF publishes articles that present current practice and research in the area of e-finance. It is dedicated to design, development, management, implementation, technology, and application issues in e-finance. Topics covered include: -E-business and IT/IS investment -E-banking/m-banking strategy/implementation -Digitisation in financial supply chain -[E-]auditing, e-taxation, e-cash flow -Customer channel management -Data mining/warehousing -E-lending/e-payment/e-procurement -Cultural/social/political issues -E-trading/online auctions -Knowledge management -Business intelligence -E-government regulation -Security/privacy/trust -IT risk analysis -Human-computer interaction