[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1280940.1280967acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
Article

First price sealed bid auction without auctioneers

Published: 12 August 2007 Publication History

Abstract

We propose two protocol variants for a first price sealed-bid auction, without using intermediatory auctioneers. One version achieves full privacy for the bidders and their bids, the other provides a form of verifiability, at the cost of some privacy. Full privacy protects all bids. In particular the winner's identity and price are only known by the seller. Lesser privacy allows the winner to be known and verified publicly. Both versions provide non-repudiation. We demonstrate correctness and show how computational and communication costs vary with different privacy levels.

References

[1]
M. Abe and K. Suzuki. M + 1st price auction using homomorphic encryption. Proc. 5th International Conference on Public Key Cryptography (PKC 02), 2002.
[2]
O. Baudron and J. Stern. Non-interactive private auctions. Proc. 5th Annual Conference on Financial Cryptography, pp. 300--313, 2001.
[3]
F. Brandt. A verifiable, bidder-resolved Auction Protocol. Proc. 5th International Workshop on Deception, Fraud and Trust in Agent Societies, pp. 18--25, 2002.
[4]
C. Cachin. Efficient private bidding and auctions with an oblivious third party . Proc. 6th ACM conference on Computer and Communications Security, pp. 120--127, 1999.
[5]
Matthew K Franklin and Michael K. Reiter. The design and implementation of a secure auction service. IEEE Trans. on Software Engineering, 22(5), pp. 302--312, 1996.
[6]
M. Jakobsson and A. Juels. Mix and match: Secure function evaluation via ciphertexts. Proc. Asiacrypt 00, pp. 162--177, 2000.
[7]
A. Juels and M. Szydlo A two server, sealed bid auction. Proc. Financial Cryptography 02, 2002.
[8]
H. Kikuchi, M. Harkavy and J. Tygar. Multi-round anonymous auction protocols. Proc. 1st IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pp. 62--69, 1998.
[9]
H. Lipmaa, N. Asokan and V. Niemi. Secure Vickrey auctions without threshold trust. Proc. 6th Annual Conference on Financial Cryptography, 2002.
[10]
M. Naor, B. Pinkas and R. Summer. Privacy Preserving Auctions and Mechanism Design. Proc. ACM conference on E-commerce, pp. 129--139, 1999.
[11]
A. Yao. Protocols for secure computations. Proc. 27th IEEE Symposium on Foundations of Computer Science, pp. 162--167, 1986.

Cited By

View all
  • (2024)Efficient and Budget-Balanced Decentralized Management of Federated Cloud and Edge Providers2024 IEEE 24th International Symposium on Cluster, Cloud and Internet Computing (CCGrid)10.1109/CCGrid59990.2024.00050(374-384)Online publication date: 6-May-2024
  • (2024)Towards a Blockchain-Enabled Trustworthy Market Framework2024 IEEE International Conference on Blockchain (Blockchain)10.1109/Blockchain62396.2024.00096(656-662)Online publication date: 19-Aug-2024
  • (2023)A Study on Privacy-Preserving Auctions Considering Possible Collusions2023 IEEE International Carnahan Conference on Security Technology (ICCST)10.1109/ICCST59048.2023.10474239(1-6)Online publication date: 11-Oct-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IWCMC '07: Proceedings of the 2007 international conference on Wireless communications and mobile computing
August 2007
716 pages
ISBN:9781595936950
DOI:10.1145/1280940
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 August 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. auction
  2. bit-commitment
  3. first price
  4. sealed-bid

Qualifiers

  • Article

Conference

IWCMC07
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Efficient and Budget-Balanced Decentralized Management of Federated Cloud and Edge Providers2024 IEEE 24th International Symposium on Cluster, Cloud and Internet Computing (CCGrid)10.1109/CCGrid59990.2024.00050(374-384)Online publication date: 6-May-2024
  • (2024)Towards a Blockchain-Enabled Trustworthy Market Framework2024 IEEE International Conference on Blockchain (Blockchain)10.1109/Blockchain62396.2024.00096(656-662)Online publication date: 19-Aug-2024
  • (2023)A Study on Privacy-Preserving Auctions Considering Possible Collusions2023 IEEE International Carnahan Conference on Security Technology (ICCST)10.1109/ICCST59048.2023.10474239(1-6)Online publication date: 11-Oct-2023
  • (2023)Trustworthy Sealed-bid Auction with Low Communication Cost atop BlockchainInformation Sciences10.1016/j.ins.2023.02.069Online publication date: Feb-2023
  • (2023)Distributed Auction-Based SFC Placement in a Multi-domain 5G EnvironmentSN Computer Science10.1007/s42979-023-02291-15:1Online publication date: 2-Dec-2023
  • (2022)SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiabilityJournal of Information Security and Applications10.1016/j.jisa.2021.10308265(103082)Online publication date: Mar-2022
  • (2018)Privacy-respecting auctions and rewarding mechanisms in mobile crowd-sensing applicationsJournal of Network and Computer Applications10.1016/j.jnca.2017.10.012100:C(24-34)Online publication date: 28-Dec-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media