[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1066677.1066861acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Implementing private Vickrey auctions

Published: 13 March 2005 Publication History

Abstract

Vickrey auctions have the interesting property of eliminating any incentive for bidders to bid values that are different from their reserve prices (i.e., the true value they give to the item being auctioned). For several reasons, it is desirable that bidders keep private their reserve price. In [2] a protocol to implement a Vickrey auction was presented. Its main feature is that bids are kept private without the necessity of any trusted third party. In particular, after the auction is finished only the value of the second highest bid and the identity of the highest bidder are publicly revealed. However, in that paper several questions about the applicability of the protocol were left unanswered. In particular, all the presentation was theoretical and no implementation was provided. Besides, the analysis of collusion risk was too brief. In this paper we address these issues in a deeper way. In addition, we present and analyze an implementation of the protocol, and we consider its practical applicability.

References

[1]
H. Lipmaa, N. Asokan, and V. Niemi. Secure Vickrey auctions without threshold trust. In Annual Conference on Financial Cryptography, LNCS 2357, pages 87--101. Springer, 2002.
[2]
N. Lopez, M. Núñez. I. Rodriguez, and F. Rubio. Improving privacy in Vickrey auctions. ACM SIGEcom Exchanges, 5(1):1--12, 2004.
[3]
M. Naor, B. Pinkas, and R. Sumner. Privacy preserving auctions and mechanism design. In ACM Conference, on Electronic Commerce, pages 129--139. ACM Press, 1999.
[4]
T. Sandholm and V. Lesser. On automated contracting in multi-enterprise manufacturing. In Distributed Enterprise: Advanced Systems and Tools, pages 33--42, 1995.
[5]
W, Vickrey. Counterspeculation, auctions, and competitive sealed tenders. Journal of Finance, 16:8--37, 1961.

Cited By

View all

Index Terms

  1. Implementing private Vickrey auctions

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '05: Proceedings of the 2005 ACM symposium on Applied computing
    March 2005
    1814 pages
    ISBN:1581139640
    DOI:10.1145/1066677
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 March 2005

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Vickrey auctions
    2. privacy

    Qualifiers

    • Article

    Conference

    SAC05
    Sponsor:
    SAC05: The 2005 ACM Symposium on Applied Computing
    March 13 - 17, 2005
    New Mexico, Santa Fe

    Acceptance Rates

    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Upcoming Conference

    SAC '25
    The 40th ACM/SIGAPP Symposium on Applied Computing
    March 31 - April 4, 2025
    Catania , Italy

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media