{"id":"https://openalex.org/W3081205467","doi":"https://doi.org/10.1155/2020/8872617","title":"SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation","display_name":"SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation","publication_year":2020,"publication_date":"2020-08-25","ids":{"openalex":"https://openalex.org/W3081205467","doi":"https://doi.org/10.1155/2020/8872617","mag":"3081205467"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8872617","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8872617","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8872617.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8872617.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100361311","display_name":"Li Li","orcid":"https://orcid.org/0000-0003-0836-2893"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I4210116144","display_name":"Chongqing University of Education","ror":"https://ror.org/02d06s578","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210116144"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Li","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu, Sichuan, China","School of Mathematics and Information Engineering, Chongqing University of Education, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I24185976"]},{"raw_affiliation_string":"School of Mathematics and Information Engineering, Chongqing University of Education, Chongqing, China","institution_ids":["https://openalex.org/I4210116144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068806771","display_name":"Jiayong Liu","orcid":"https://orcid.org/0000-0002-5895-8276"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiayong Liu","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089704563","display_name":"Peng Jia","orcid":"https://orcid.org/0000-0002-0455-8779"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peng Jia","raw_affiliation_strings":["College of Cybersecurity, Sichuan University, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"College of Cybersecurity, Sichuan University, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068806771","https://openalex.org/A5089704563"],"corresponding_institution_ids":["https://openalex.org/I24185976"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.1326,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.54194642,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bidding","display_name":"Bidding","score":0.8963197469711304},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7617321014404297},{"id":"https://openalex.org/keywords/procurement","display_name":"Procurement","score":0.7085320949554443},{"id":"https://openalex.org/keywords/tender-offer","display_name":"Tender offer","score":0.5156020522117615},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5080711841583252},{"id":"https://openalex.org/keywords/real-time-bidding","display_name":"Real-time bidding","score":0.4530264735221863},{"id":"https://openalex.org/keywords/combinatorial-auction","display_name":"Combinatorial auction","score":0.4468265771865845},{"id":"https://openalex.org/keywords/generality","display_name":"Generality","score":0.42636406421661377},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4185546338558197},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41455578804016113},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.33838239312171936},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15764173865318298},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.14605239033699036},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.10060447454452515},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.09376215934753418}],"concepts":[{"id":"https://openalex.org/C9233905","wikidata":"https://www.wikidata.org/wiki/Q3276328","display_name":"Bidding","level":2,"score":0.8963197469711304},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7617321014404297},{"id":"https://openalex.org/C201650216","wikidata":"https://www.wikidata.org/wiki/Q829492","display_name":"Procurement","level":2,"score":0.7085320949554443},{"id":"https://openalex.org/C136221606","wikidata":"https://www.wikidata.org/wiki/Q25245116","display_name":"Tender offer","level":4,"score":0.5156020522117615},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5080711841583252},{"id":"https://openalex.org/C1525070","wikidata":"https://www.wikidata.org/wiki/Q2134714","display_name":"Real-time bidding","level":3,"score":0.4530264735221863},{"id":"https://openalex.org/C59919655","wikidata":"https://www.wikidata.org/wiki/Q5150821","display_name":"Combinatorial auction","level":3,"score":0.4468265771865845},{"id":"https://openalex.org/C2780767217","wikidata":"https://www.wikidata.org/wiki/Q5532421","display_name":"Generality","level":2,"score":0.42636406421661377},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4185546338558197},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41455578804016113},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.33838239312171936},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15764173865318298},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.14605239033699036},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.10060447454452515},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.09376215934753418},{"id":"https://openalex.org/C120757647","wikidata":"https://www.wikidata.org/wiki/Q381136","display_name":"Shareholder","level":3,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8872617","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8872617","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8872617.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:cadff68fadec41858929f39e211bf53b","is_oa":true,"landing_page_url":"https://doaj.org/article/cadff68fadec41858929f39e211bf53b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8872617","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8872617","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8872617.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1161649848","display_name":null,"funder_award_id":"KJ1601401","funder_id":"https://openalex.org/F4320325897","funder_display_name":"Chongqing University of Education"},{"id":"https://openalex.org/G2462582459","display_name":null,"funder_award_id":"2020YFG0076","funder_id":"https://openalex.org/F4320325897","funder_display_name":"Chongqing University of Education"},{"id":"https://openalex.org/G4010032527","display_name":null,"funder_award_id":"KJ1601401","funder_id":"https://openalex.org/F4320333335","funder_display_name":"Sichuan Province Science and Technology Support Program"},{"id":"https://openalex.org/G4282607262","display_name":null,"funder_award_id":"KY201725C","funder_id":"https://openalex.org/F4320324805","funder_display_name":"Chongqing Municipal Education Commission"},{"id":"https://openalex.org/G4371723632","display_name":null,"funder_award_id":"KY201725C","funder_id":"https://openalex.org/F4320325897","funder_display_name":"Chongqing University of Education"},{"id":"https://openalex.org/G4800891632","display_name":null,"funder_award_id":"KY201725C","funder_id":"https://openalex.org/F4320333335","funder_display_name":"Sichuan Province Science and Technology Support Program"},{"id":"https://openalex.org/G6632328411","display_name":null,"funder_award_id":"2020YFG0076","funder_id":"https://openalex.org/F4320324805","funder_display_name":"Chongqing Municipal Education Commission"},{"id":"https://openalex.org/G6758146632","display_name":null,"funder_award_id":"2020YFG0076","funder_id":"https://openalex.org/F4320333335","funder_display_name":"Sichuan Province Science and Technology Support Program"},{"id":"https://openalex.org/G705472478","display_name":null,"funder_award_id":"KJ1601401","funder_id":"https://openalex.org/F4320324805","funder_display_name":"Chongqing Municipal Education Commission"}],"funders":[{"id":"https://openalex.org/F4320321135","display_name":"Chongqing University","ror":"https://ror.org/023rhb549"},{"id":"https://openalex.org/F4320324805","display_name":"Chongqing Municipal Education Commission","ror":"https://ror.org/031nm5713"},{"id":"https://openalex.org/F4320325897","display_name":"Chongqing University of Education","ror":"https://ror.org/02d06s578"},{"id":"https://openalex.org/F4320333335","display_name":"Sichuan Province Science and Technology Support Program","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3081205467.pdf","grobid_xml":"https://content.openalex.org/works/W3081205467.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W2014841127","https://openalex.org/W2023951105","https://openalex.org/W2326245332","https://openalex.org/W2405356014","https://openalex.org/W2433302523","https://openalex.org/W2773241197","https://openalex.org/W2801382139","https://openalex.org/W2912718313","https://openalex.org/W2932850993"],"related_works":["https://openalex.org/W2372662578","https://openalex.org/W2141395620","https://openalex.org/W784208287","https://openalex.org/W341704063","https://openalex.org/W2355176056","https://openalex.org/W4310829256","https://openalex.org/W2367213784","https://openalex.org/W2389286292","https://openalex.org/W4385421505","https://openalex.org/W2914653609"],"abstract_inverted_index":{"Over":[0],"the":[1,11,14,23,33,56,69,86,96,100,114,140,169],"past":[2],"decades,":[3],"there":[4],"have":[5],"existed":[6],"extensive":[7],"research":[8],"works":[9,41],"on":[10,126,139],"designs":[12],"of":[13,35,116],"closest":[15,24,70,101],"pre-tender":[16,25,71,97,102],"procurement":[17,65,177],"bidding.":[18],"However,":[19],"most":[20],"solutions":[21],"for":[22,55,68,80,113],"only":[26,155],"target":[27],"at":[28],"economic":[29],"benefits":[30],"while":[31],"omitting":[32],"problem":[34],"bid":[36,83],"privacy":[37,111],"leakage.":[38],"Moreover,":[39],"existing":[40],"fail":[42],"to":[43,98,150],"provide":[44],"approaches":[45],"with":[46,72,95,105,131,179],"adequate":[47],"security":[48],"and":[49,133,143,183],"high":[50,120],"efficiency.":[51,121,170],"In":[52],"this":[53],"paper,":[54],"first":[57],"time,":[58],"we":[59],"propose":[60],"SPCTR,":[61],"a":[62,77,81,92],"sealed-price":[63,93],"auction-based":[64],"bidding":[66,178],"system":[67],"range":[73,78],"validation.":[74],"SPCTR":[75,90,108,122,159,175],"allows":[76],"validation":[79],"supplier\u2019s":[82],"without":[84,118],"leaking":[85],"secret":[87],"bid.":[88,103],"Besides,":[89],"achieves":[91,176],"comparison":[94],"find":[99],"Compared":[104],"previous":[106],"works,":[107],"provides":[109],"strong":[110],"protection":[112],"bids":[115],"suppliers":[117],"sacrificing":[119],"is":[123,160],"constructed":[124],"based":[125],"carefully":[127],"designed":[128],"cryptographic":[129],"tools":[130,145],"generality":[132],"simplicity":[134],"which":[135],"enable":[136],"various":[137],"operations":[138],"encrypted":[141],"values,":[142],"these":[144],"can":[146],"be":[147],"easily":[148],"applied":[149],"other":[151],"contexts.":[152],"We":[153],"not":[154],"formally":[156],"prove":[157],"that":[158,174],"secure":[161],"against":[162],"semihonest":[163],"adversaries":[164],"but":[165],"also":[166],"comprehensively":[167],"analyze":[168],"Experimental":[171],"results":[172],"validate":[173],"light":[180],"computation":[181],"time":[182],"communication":[184],"cost":[185],"in":[186],"practice.":[187]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
