“…Starting with the work by Nurmi and Salomaa [37] and Franklin and Reiter [19], numerous secure sealed-bid auction schemes have been proposed in recent years, e.g., [1,2,27,29,32,35,36,44]. Basically, all of the existing protocols have in common that privacy is obtained by distributing the computation of the outcome on a group of third parties.…”