Proceedings of the 8th International Conference on Electronic Commerce the New E-Commerce: Innovations for Conquering Current B 2006
DOI: 10.1145/1151454.1151478
|View full text |Cite
|
Sign up to set email alerts
|

Practical secrecy-preserving, verifiably correct and trustworthy auctions

Abstract: We present a practical system for conducting sealed-bid auctions that preserves the secrecy of the bids while providing for verifiable correctness and trustworthiness of the auction. The auctioneer must accept all bids submitted and follow the published rules of the auction. No party receives any useful information about bids before the auction closes and no bidder is able to change or repudiate her 1 bid. Our solution uses Paillier's homomorphic encryption scheme [25] for zero knowledge proofs of correctness.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
62
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(63 citation statements)
references
References 84 publications
1
62
0
Order By: Relevance
“…However, in many cases privacy is achieved by using third parties, either through numerous auctioneers or by asymmetric models in which in addition to the auctioneer the entity of a supervisor (or auction issuer) is assumed (Naor et al, 1999;Lipmaa et al, 2003). Parkes et al (Parkes et al, 2008) settle for verifiable correctness and trustworthiness in combination with complete secrecy to all parties except the auctioneer. However, their scheme demands considerable time for preparation and verification of auctions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, in many cases privacy is achieved by using third parties, either through numerous auctioneers or by asymmetric models in which in addition to the auctioneer the entity of a supervisor (or auction issuer) is assumed (Naor et al, 1999;Lipmaa et al, 2003). Parkes et al (Parkes et al, 2008) settle for verifiable correctness and trustworthiness in combination with complete secrecy to all parties except the auctioneer. However, their scheme demands considerable time for preparation and verification of auctions.…”
Section: Related Workmentioning
confidence: 99%
“…This Table 1: Comparison of various secure auction schemes. Legend: n -Number of bidders; α -Probability that a third party verifies auctioneer's output; l -Maximum number of bits needed to represent a single bid; k -A constant used in (Parkes et al, 2008).…”
Section: Time Lapse Cryptography Servicementioning
confidence: 99%
“…Any basic cryptographic protocols supporting provably correct, secrecy-preserving computation over private inputs, such as those described in [20], [15] and [14], are sufficient to construct our exchange. As our protocol does not depend on specific features, such as a particular homomorphism, we do not burden our exposition with specific implementation details.…”
Section: Cryptographic Combinatorial Securities Exchangesmentioning
confidence: 99%
“…If a homomorphic cryptosystem is used for the computations, such as the system described by Paillier [10] and elaborated in [14] and [4], then additional preparation is required to prove results of computations employing both additions and multiplications. Since no known cryptosystem is doubly homomorphic, 4 we require instead that whatever underlying cryptosystem is employed support proofs of correct computation of both addition and multiplication.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation