[22] C. ¨
Ozturan, “Used car salesman problem: A differential auction-
barter market,” Annals of Mathematics and Artificial Intelli-
gence, vol. 44, no. 3, pp. 255–267, July 2005.
[23] Y. Yu, C. Yao, Y. Zhang, and R. Jiang, “Second-hand car trading
framework based on blockchain in cloud service environment,”
in 2021 2nd Asia Conference on Computers and Communica-
tions (ACCC), 2021, pp. 115–121.
[24] B. Sawicki and M. Scherer, “Learnings from the swiss second-
hand car market for e-mobility,” in 2020 17th International
Conference on the European Energy Market (EEM), 2020, pp.
1–6.
[25] V. Sathiya, M. Chinnadurai, S. Ramabalan, and A. Appolloni,
“Mobile robots and evolutionary optimization algorithms for
green supply chain management in a used-car resale company,”
Environment, Development and Sustainability, vol. 23, no. 6,
pp. 9110–9138, June 2021.
[26] A. Papagapiou, J. Mingers, and E. Thanassoulis, “Would you
buy a used car with DEA?” OR Insight, vol. 10, no. 1, pp.
13–19, January 1997.
[27] A. N. Guda and A. N. Tsurikov, “The artificial neural network
application for service-oriented evaluation of the used cars,” in
Advances in Automation, A. A. Radionov and A. S. Karandaev,
Eds. Cham: Springer International Publishing, 2020, pp. 965–
975.
[28] A. Pehlken, B. Koch, and M. Kalverkamp, “Assessment of
reusability of used car part components with support of de-
cision tool RAUPE,” in Cascade Use in Technologies 2018,
A. Pehlken, M. Kalverkamp, and R. Wittstock, Eds. Berlin,
Heidelberg: Springer Berlin Heidelberg, 2019, pp. 75–82.
[29] J. Marshall, “Some reflections on second-hand cars:: With
hints on their purchase,” The Lancet, vol. 205, no. 5292,
pp. 249–250, 1925, originally published as Volume 1,
Issue 5292. [Online]. Available: https://www.sciencedirect.
com/science/article/pii/S0140673600560322
[30] S. Mbaye, M. Bunel, Y. L’Horty, P. Petit, and L. du Parquet,
“Discriminations in the market for “Lemons”: A multicriteria
correspondence test in france,” Economics of Transportation,
vol. 24, p. 100192, 2020. [Online]. Available: https://www.
sciencedirect.com/science/article/pii/S2212012220301283
[31] F. S. Grodzinsky, K. W. Miller, and M. J. Wolf, “Developing
artificial agents worthy of trust: “would you buy a used car
from this artificial agent?”,” Ethics and Information Technology,
vol. 13, no. 1, pp. 17–27, March 2011.
[32] X. hai Lu and J. kun Yu, “Research on second-hand car trading
system based on blockchain,” Software Guide, vol. 20, no. 9,
pp. 185–190, 2021.
[33] L. Liu, H. Shu, and Y. Zhang, “Operation mechanism of
the whole used car industry chain intelligent entrepreneurship
and innovation platform,” Industrial Technology and Vocational
Education, vol. 19, no. 2, pp. 114–117, 2021.
[34] Y. Li, “Pay attention to seven problems of online used car
trading platform,” China Quality Wan Lixing Magzine, no. 8,
pp. 82–83, 0221.
[35] G. Zhu, F. Zhao, H. Hao, and Z. Liu, “Blockchain technology
and its application in automotive field,” Automotive Engineer-
ing, vol. 43, no. 9, pp. 1278–1284, 2021.
[36] S. Wang and Y. Wang, “Research of the reform of second-hand
car appraisal and evaluation curriculum,” Heilongjiang Science,
vol. 12, no. 15, pp. 80–81, 2021.
[37] X. Yin and B. Peng, “Curriculum design of used car technol-
ogy appraisal based on working process,” Internal Combustion
Engine and Parts, no. 15, pp. 250–251, 2021.
[38] X. Yin and S. Lin, “Exploration on the construction of profes-
sional curriculum system of used car appraisal and evaluation
in vocational schools,” Auto Time, no. 15, pp. 28–29, 2021.
[39] X. Liu, H. Zou, D. Yue, W. Niu, B. Zhao, and T. Fu, “Research
on the teaching reform of the course certificate integration of
second-hand car appraisal and evaluation under the background
of “1+x” certificate system,” Automobile Applied Technology,
no. 12, pp. 152–154, 2021.
[40] Z. Gao, “Tesla introduces a third-party appraiser to provide old
car replacement services,” For Repair and Maintenance, no. 4,
p. 16, 2021.
[41] C. Qiao, “18 new occupations such as beverage dispenser and
used car broker ‘become regular’,” Modern Youth, no. 6, pp.
44–46, 2021.
[42] X. Cheng and Q. Song, “On second hand car and its appraisal
and evaluation method,” Auto Time, no. 6, pp. 183–184, 2021.
[43] R. Zhang, “The second-hand appraisal and evaluation based the
case analysis,” Auto Time, no. 6, pp. 185–186, 2021.
[44] “The relevant person in charge of the people’s bank of china on
notice on preventing and dealing with the risk of speculation
in virtual currency transactions,” Financial Accounting, no. 10,
pp. 5–6, September 2021.
[45] Ma, Ling, “Maintain a high-pressure crackdown on virtual
currency trading speculation,” Financial News, September 2021.
[46] J. Wu and C. Liu, “A study of anonymous delivery based on
blind signature scheme,” Procedia Computer Science, vol. 52,
pp. 1065–1070, 2015.
[47] J. Wu, C. Liu, and D. Gardner, “A study of anonymous pur-
chasing based on mobile payment system,” Procedia Computer
Science, vol. 83, pp. 685–689, 2016.
[48] C. Zhang, Y.-Z. Luo, C. Liu, and B. Zhao, “A dynamic passcode
system for mobile purchasing without bank card,” in 2018 9th
International Symposium on Parallel Architectures, Algorithms
and Programming (PAAP), 2018, pp. 111–113.
[49] R. L. Rivest, A. Shamir, and L. Adleman, “A method for
obtaining digital signatures and public-key cryptosystems,”
Communications of the ACM, vol. 21, no. 2, pp. 120–126, Feb.
1978.
[50] T. ElGamal, “A public-key cryptosystem and a signature scheme
based on discrete logarithms,” IEEE Transactions on Informa-
tion Theory, vol. 31, no. 4, pp. 469–472, 1985.
[51] Y. Lv, C. Liu, and T. Huang, “Research on the university library
anonymous customer complaint system based on blockchain
technology,” Design Engineering, no. 2, pp. 681–689, 2021.
[52] W. Diffie and M. Hellman, “New directions in cryptography,”
IEEE Transactions on Information Technology, vol. IT-22, no. 6,
pp. 644–654, 1976.
[53] Wikipedia, “Discrete logarithm,” https://en.wikipedia.org/wiki/
Discrete logarithm.
[54] ——, “Computational Diffie-Hellman assumption,”
https://en.wikipedia.org/wiki/Computational Diffie-Hellman
assumption.
[55] ——, “Diffie-Hellman key exchange,” https://en.wikipedia.org/
wiki/Diffie Hellman key exchange.
[56] ——, “Decisional Diffie-Hellman assumption,” https://en.
wikipedia.org/wiki/Decisional Diffie-Hellman assumption.
[57] ——, “Cryptographic hash function,” https://en.wikipedia.org/
wiki/Cryptographic hash function.
Creative Commons Attribution License 4.0
(Attribution 4.0 International, CC BY 4.0)
This article is published under the terms of the Creative
Commons Attribution License 4.0
https://creativecommons.org/licenses/by/4.0/deed.en_US
WSEAS TRANSACTIONS on COMPUTER RESEARCH
DOI: 10.37394/232018.2022.10.14
Chi Huang, Chenglian Liu, Sonia C-I Chen