2020
DOI: 10.1007/978-3-030-43725-1_14
|View full text |Cite
|
Sign up to set email alerts
|

Trustee: Full Privacy Preserving Vickrey Auction on Top of Ethereum

Abstract: The wide deployment of tokens for digital assets on top of Ethereum implies the need for powerful trading platforms. Vickrey auctions have been known to determine the real market price of items as bidders are motivated to submit their own monetary valuations without leaking their information to the competitors. Recent constructions have utilized various cryptographic protocols such as ZKP and MPC, however, these approaches either are partially privacy-preserving or require complex computations with several rou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(26 citation statements)
references
References 22 publications
0
26
0
Order By: Relevance
“…As part of their other contribution [264], the same authors improved on high costs intrinsic to their former work [263] by using zk-SNARKs and its off-chain computation, which requires only a single on-chain proof verification of the whole auction process. However, in both approaches [263], [264], the auctioneer might compromise the privacy of all bids, which led the same authors to propose Trustee [265], Vulnerabilities, threats, and defenses of the auctions category (application layer).…”
Section: G Auctionsmentioning
confidence: 99%
See 1 more Smart Citation
“…As part of their other contribution [264], the same authors improved on high costs intrinsic to their former work [263] by using zk-SNARKs and its off-chain computation, which requires only a single on-chain proof verification of the whole auction process. However, in both approaches [263], [264], the auctioneer might compromise the privacy of all bids, which led the same authors to propose Trustee [265], Vulnerabilities, threats, and defenses of the auctions category (application layer).…”
Section: G Auctionsmentioning
confidence: 99%
“…Since the auctioneer of some protocols (e.g., [263], [264]) sees the bidders and their bids in plain-text, she might either intentionally or accidentally (e.g., an external compromise) leak these data (and their corresponding proofs) that are attributable to particular bidders. The protection technique is to avoid the auctioneer from seeing the plain-text of the bids, and instead use privacy-preserving integer comparison (e.g., [266]) or trusted computing-based solutions (e.g., [265]).…”
Section: ) Security Threats and Mitigationsmentioning
confidence: 99%
“…However, these constructions are generally complex and inefficient. Galal and Youssef [27] proposed Trustee as a trusted and efficient Vickrey auction on top of Ethereum for full privacy-preservation with much lower fees for the online auction. A prototype of Trustee for the inspection and security analysis and gas costs are provided.…”
Section: Related Workmentioning
confidence: 99%
“…Galal and Youssef propose a number of sealed bid auctions [17], [18]. Most recently, Trustee [19] presents a Vickrey auction on Ethereum using TEEs. The smart contract is used as a billboard, after which computation is transferred to an enclave using a relay controlled by an auctioneer.…”
Section: B Auctions On Blockchainmentioning
confidence: 99%