2013
DOI: 10.1007/978-3-642-38553-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Brandt’s Fully Private Auction Protocol Revisited

Abstract: Abstract. Auctions have a long history, having been recorded as early as 500 B.C. [17]. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt [4] developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…When these existing privacy preserving and/or verifiable auction mechanisms are directly applied to ad exchanges, they have high computation and communication complexity. Thus, these works could only support auctions with small scale [37,42,43] or a limited number of possible bids [44,45,46], which may be unacceptable for today's ad exchanges.…”
Section: Related Workmentioning
confidence: 99%
“…When these existing privacy preserving and/or verifiable auction mechanisms are directly applied to ad exchanges, they have high computation and communication complexity. Thus, these works could only support auctions with small scale [37,42,43] or a limited number of possible bids [44,45,46], which may be unacceptable for today's ad exchanges.…”
Section: Related Workmentioning
confidence: 99%
“…The tool has been used to verify many security and privacy properties, e.g., see [32,33,34,35,36,9,37,21].…”
Section: Proverifmentioning
confidence: 99%
“…However, security protocols are notoriously difficult to design and analyse, and proofs of security protocols are known to be error-prone, thus we do not want to rely on an informal analysis. In several cases, formal verification found security flaws in protocols which were thought to be secure [19,20,15,21].…”
Section: Introductionmentioning
confidence: 99%
“…The seller then determines the winner using the same technique as above. 7 To prove to the bidders that his result is correct, he sends 7 There is a potential attack when a bidder and the seller collude: the seller can open all bids from the other bidders until he identifies the highest bid, and then inform the colluding bidder to submit a bid for the same price in order to provoke a tie. Note that this can only be used to provoke a tie, as submitting a higher bid afterwards results in two envelopes for different prices containing "Yes" with broken seals, which can be detected.…”
Section: A Distributed Variantmentioning
confidence: 99%
“…only the winner and the seller learn who the winner is. However, the reliance on cryptographic primitives has its downside: cryptographic primitives are complex, and their use requires great care not to introduce subtle weaknesses, as recent analysis of Brandt's protocol shows [7].…”
Section: Introductionmentioning
confidence: 99%