2006
DOI: 10.1007/s10207-006-0001-y
|View full text |Cite
|
Sign up to set email alerts
|

How to obtain full privacy in auctions

Abstract: Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols that only yield the winners' identities and the selling price. Moreover, if desired, losing bidders learn no information at all, except that they lost. Our security model is merely based on computational intractability. In particular, our approach does not rely on trusted third parties, e.g., auctioneers. We present an efficient implementation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
84
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 67 publications
(84 citation statements)
references
References 44 publications
0
84
0
Order By: Relevance
“…The protocol of Brandt [4] was designed to ensure full privacy in a completely distributed way. It exploits the homomorphic properties of a distributed El-Gamal encryption scheme [12] for a secure multi-party computation of the winner.…”
Section: The Protocolmentioning
confidence: 99%
See 4 more Smart Citations
“…The protocol of Brandt [4] was designed to ensure full privacy in a completely distributed way. It exploits the homomorphic properties of a distributed El-Gamal encryption scheme [12] for a secure multi-party computation of the winner.…”
Section: The Protocolmentioning
confidence: 99%
“…, k} (where bid a is the bid chosen by the bidder with index a), Y ∈ G q \ {1}. More precisely, the n bidders execute the following five steps of the protocol [4]:…”
Section: Mathematical Description (Brandt [4])mentioning
confidence: 99%
See 3 more Smart Citations