2011
DOI: 10.1007/s11276-011-0390-3
|View full text |Cite
|
Sign up to set email alerts
|

Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer

Abstract: Spectrum auction is an enabling technology for improving the spectrum efficiency of unused licensed bands (white spaces) in wireless networks. However, the back-room dealing (i.e., the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) poses serious security challenges, leading to failures of all existing secure auction designs in allocating spectrum bands. In this paper, we propose a secure combinatorial spectrum auction (SCSA) by utilizing homo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
23
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(23 citation statements)
references
References 45 publications
0
23
0
Order By: Relevance
“…However, SPRING depends on a trusted third party (the agent). In [6,7], the authors utilize a vector of cipher text to mask the bidding prices, and guarantee that the maximum value, randomizing the bids, and charging the bidders can be figured out. However, the schemes [6,7] are not practical as homomorphic encryption has a very high computational overhead, which is not applicable to the applications now.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, SPRING depends on a trusted third party (the agent). In [6,7], the authors utilize a vector of cipher text to mask the bidding prices, and guarantee that the maximum value, randomizing the bids, and charging the bidders can be figured out. However, the schemes [6,7] are not practical as homomorphic encryption has a very high computational overhead, which is not applicable to the applications now.…”
Section: Related Workmentioning
confidence: 99%
“…In [6,7], the authors utilize a vector of cipher text to mask the bidding prices, and guarantee that the maximum value, randomizing the bids, and charging the bidders can be figured out. However, the schemes [6,7] are not practical as homomorphic encryption has a very high computational overhead, which is not applicable to the applications now. In [8], a secure auction without auctioneer scheme for VCG auction is designed based on homomorphic, in which the bidders work together to decide who the winner is without auctioneer; however, the computational overhead is high for each bidder, which has low efficiency.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, to be secured, it is critical to design auction mechanisms to preserve bid privacy. For this purpose, a number of secure auctions have been proposed . However, there are still some weaknesses in these approaches.…”
Section: Introductionmentioning
confidence: 99%
“…To achieve this objective, auctions have been applied to construct market-based mechanisms for spectrum allocation [1,6,7,9,10,12,15,16,21,22,24,[27][28][29]. But most existing research overlooks the following important issues in a spectrum trading market.…”
Section: Introductionmentioning
confidence: 99%