“…Depending on the underlying security model these proposals can be classified into the following three categories. In the first category, there are protocols that rely on computation that is distributed among auctioneers who jointly determine the outcome of an auction using threshold multi-party computation (e.g., [14,15,22]). The second category of protocols introduces a semi-trusted third party, aka an "auction issuer" or "auction authority", in addition to the auctioneer, and uses asymmetric multiparty computation technique, such as Yao's garbled circuit (e.g., [1,2,5,19,21]).…”