Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1267147.1267153guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Electronic auctions with private bids

Published: 31 August 1998 Publication History

Abstract

Auctions are a fundamental electronic commerce technology. We describe a set of protocols for performing sealed-bid electronic auctions which preserve the privacy of the submitted bids using a form of secure distributed computation. Bids are never revealed to any party, even after the auction is completed. Both first-price and second-price (Vickrey) auctions are supported, and the computational costs of the methods are low enough to allow their use in many real-world auction situations.

References

[1]
{1} D. Beaver. Security, fault tolerance, and communication complexity in distributed systems. Technical Report HAR-CS-24-90, Computer Science Department, Harvard University, Boston, MA, 1992. Ph.D. thesis.]]
[2]
{2} M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computing. In Proceedings of the 20th STOC, pages 1-10. ACM, 1988.]]
[3]
{3} D. Chaum, C. Crepeau, and I. Damgard. Multiparty unconditionally secure protocols. In Proceedings of the 20th STOC, pages 11-19. ACM, 1988.]]
[4]
{4} B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. In STOC, pages 383-395. ACM, 1985.]]
[5]
{5} David Clark. Internet cost allocation and pricing. In Lee McKnight and Joseph P. Bailey, editors, Internet Economics, Cambridge, MA, 1997. MIT Press.]]
[6]
{6} Matthew K. Franklin and Michael K. Reiter. Verifiable signature sharing. In L.C. Guillou and J. Quisquater, editors, EUROCRYPT95, pages 50-63. Springer-Verlag, 1995. Lecture Notes in Computer Science No. 921.]]
[7]
{7} Matthew K. Franklin and Michael K. Reiter. The design and implementation of a secure auction server. IEEE Trans. on Software Engineering , 22(5):302-312, 1996.]]
[8]
{8} O. Goldreich, S. Micali, and A. Wigderson. How to play and mental game. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pages 218-229, May 1987.]]
[9]
{9} Andreu Mas-Colell, Michael D. Winston, and Jerry R. Green. Incentives and mechanism design. In Microeconomic Theory, New York, 1995. Oxford University Press.]]
[10]
{10} Lee McKnight and Joseph Bailey. Internet Economics . MIT Press, Cambridge, MA, 1997.]]
[11]
{11} Paul Milgrom. Auction theory. In Advances in Economic Theory 1985: Fifth World Congress. Cambridge University Press, 1985.]]
[12]
{12} A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-614, November 1979.]]
[13]
{13} William Vickrey. Counterspeculation, auctions, and competitive sealed tenders. Journal of Finance , 16, 1961.]]
[14]
{14} Robert Wilson. Auction theory. In J. Eatwell, M. Milgate, and P. Newman, editors, The New Palgrave, London, 1987. MacMillan.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
WOEC'98: Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
August 1998
244 pages

Publisher

USENIX Association

United States

Publication History

Published: 31 August 1998

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Sealed-bid auctionSecurity and Communication Networks10.1002/sec.12688:18(3415-3440)Online publication date: 1-Dec-2015
  • (2014)Efficient Sealed-Bid Auction Protocols Using Verifiable Secret SharingProceedings of the 10th International Conference on Information Security Practice and Experience - Volume 843410.1007/978-3-319-06320-1_23(302-317)Online publication date: 5-May-2014
  • (2013)Verifiable auctions for online ad exchangesACM SIGCOMM Computer Communication Review10.1145/2534169.248603843:4(195-206)Online publication date: 27-Aug-2013
  • (2013)Verifiable auctions for online ad exchangesProceedings of the ACM SIGCOMM 2013 conference on SIGCOMM10.1145/2486001.2486038(195-206)Online publication date: 12-Aug-2013
  • (2013)Defining verifiability in e-auction protocolsProceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security10.1145/2484313.2484387(547-552)Online publication date: 8-May-2013
  • (2013)Formal verification of e-auction protocolsProceedings of the Second international conference on Principles of Security and Trust10.1007/978-3-642-36830-1_13(247-266)Online publication date: 16-Mar-2013
  • (2011)Development and evaluation of a secure, privacy preserving combinatorial auctionProceedings of the Ninth Australasian Information Security Conference - Volume 11610.5555/2460416.2460426(67-76)Online publication date: 17-Jan-2011
  • (2010)Analysis of a receipt-free auction protocol in the applied pi calculusProceedings of the 7th International conference on Formal aspects of security and trust10.5555/1964555.1964570(223-238)Online publication date: 16-Sep-2010
  • (2010)Unconditionally secure first-price auction protocols using a multicomponent commitment schemeProceedings of the 12th international conference on Information and communications security10.5555/1948352.1948377(266-280)Online publication date: 15-Dec-2010
  • (2009)A new secure and efficient M+1st price auction scheme based on ECC systemProceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication10.5555/1719110.1719226(489-492)Online publication date: 20-Aug-2009
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media