Abstract
M. Yokoo et al. analyzed some weaknesses in McAfee’s double auction (MCD) protocol and proposed a robust threshold price double auction (TPD) protocol against false-name bids. Unfortunately, as their protocol strongly depends on the trust of auctioneer, the auctioneer’s misbehavior may fail an auction process. In addition, their scheme is in fact not robust in terms of comprehensive false bids. In this paper, we further investigate weaknesses in both MCD and TPD protocols, and then propose an improved double auction protocol against false bids. We also extend it for a practical and secure double auction implementation.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)
Friedman, D., Rust, J.: The Double Auction Market. Addison-Wesley Publishing Company, Reading (1993)
Ham, W., Kim, K., Imai, H.: Yet Another Strong Sealed-Bid Auctions. In: SCIS 2003, vol. 1/2, pp. 11–16 (2003)
Kikuchi, H. (M+1)st-price auction protocol. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, p. 341. Springer, Heidelberg (2002)
Lee, B., Kim, K., Ma, J.: Efficient public auction with one-time registration and public verifiability. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, p. 162. Springer, Heidelberg (2001)
Preston, M.: A Dominant Strategy Double Auction. Journal of Economic Theory 56, 434–450 (1992)
Yokoo, M., Sakurai, Y., Matsubara, S.: Robust Double Auction Protocol against False-name Bids. In: Proceeding of the 21st International Conference on Distributed Computing Systems, 2001, pp. 241–252. IEEE Computer Society, Los Alamitos (2005)
Yokoo, M., Sakurai, Y., Matsubara, S.: Robust Double Auction Protocol against False-name Bids. Decision Support Systems 39, 241–252 (2005)
Omote, K., Miyaji, A.: A practical english auction with one-time registration. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 221–234. Springer, Heidelberg (2001)
Peng, K., Boyd, C., Dawson, E., Viswanathan, K.: Robust, privacy protecting and publicly verifiable sealed-bid auction. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 147–159. Springer, Heidelberg (2002)
Vickrey, W.: Counterspeculation, Auction, and Competitive Sealed Tenders. Journal of Finance 16(1), 8–37 (1961)
Wang, C., Leung, F.: Secure Double Auction Protocols with Full Privacy Protection. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 215–229. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ha, J., Zhou, J., Moon, S. (2005). An Improved Double Auction Protocol Against False Bids. In: Katsikas, S., López, J., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537878_28
Download citation
DOI: https://doi.org/10.1007/11537878_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28224-2
Online ISBN: 978-3-540-31796-8
eBook Packages: Computer ScienceComputer Science (R0)