2016
DOI: 10.1002/sec.1522
|View full text |Cite
|
Sign up to set email alerts
|

Secure multi-unit sealed first-price auction mechanisms

Abstract: Due to the popularity of auction mechanisms in real‐world applications and the increasing awareness of securing private information, auctions are in dire need of bid‐privacy protection. In this paper, we design three secure, multi‐unit, sealed‐bid, first‐price auction schemes. The first is a secure auction using homomorphic encryption and is denoted by SAHE; the second is a secure action using masking values and is denoted by SAMV; and the third has an improved masked noise algorithm, denoted by ISAMV. In the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
2

Relationship

3
7

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…We give a concrete example of Homomorphic encryption in an auction scheme here. In a privacy-preserving auction scheme [49,48,55,42,51], a group of n bidders submit their bidding values b i to an auctioneer. The auctioneer needs to compute the sum of the bidding values without seeing each individual bidding value.…”
Section: Methodsmentioning
confidence: 99%
“…We give a concrete example of Homomorphic encryption in an auction scheme here. In a privacy-preserving auction scheme [49,48,55,42,51], a group of n bidders submit their bidding values b i to an auctioneer. The auctioneer needs to compute the sum of the bidding values without seeing each individual bidding value.…”
Section: Methodsmentioning
confidence: 99%
“…As privacy has been one of the most important issues in many real-world applications and is getting more and more attentions, it is inevitable that privacy protection will become a critical research direction to further promote widespread adoption of Bitcoin-based applications. Protecting privacy should take into account requirements of various application scenarios, such as Internet of Things (IoT) and online social networks, which could be inspired by many existing works [19,20,24,5,6,25,46,47,43,26,49,17,48,15,16]. 6.…”
Section: 4mentioning
confidence: 99%
“…An auction-based mechanism where bidders send their bids to be evaluated by a third party agent could be a solution to this issue. Under this construct, the demands of higher bidders are fulfilled to maintain reliability of an electric grid, even in the peak hours [17].…”
Section: Introductionmentioning
confidence: 99%