Skip to main content

An Improved Double Auction Protocol Against False Bids

  • Conference paper
Book cover Trust, Privacy, and Security in Digital Business (TrustBus 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3592))

Abstract

M. Yokoo et al. analyzed some weaknesses in McAfee’s double auction (MCD) protocol and proposed a robust threshold price double auction (TPD) protocol against false-name bids. Unfortunately, as their protocol strongly depends on the trust of auctioneer, the auctioneer’s misbehavior may fail an auction process. In addition, their scheme is in fact not robust in terms of comprehensive false bids. In this paper, we further investigate weaknesses in both MCD and TPD protocols, and then propose an improved double auction protocol against false bids. We also extend it for a practical and secure double auction implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)

    Google Scholar 

  2. Friedman, D., Rust, J.: The Double Auction Market. Addison-Wesley Publishing Company, Reading (1993)

    Google Scholar 

  3. Ham, W., Kim, K., Imai, H.: Yet Another Strong Sealed-Bid Auctions. In: SCIS 2003, vol. 1/2, pp. 11–16 (2003)

    Google Scholar 

  4. Kikuchi, H. (M+1)st-price auction protocol. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, p. 341. Springer, Heidelberg (2002)

    Google Scholar 

  5. Lee, B., Kim, K., Ma, J.: Efficient public auction with one-time registration and public verifiability. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, p. 162. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Preston, M.: A Dominant Strategy Double Auction. Journal of Economic Theory 56, 434–450 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  7. Yokoo, M., Sakurai, Y., Matsubara, S.: Robust Double Auction Protocol against False-name Bids. In: Proceeding of the 21st International Conference on Distributed Computing Systems, 2001, pp. 241–252. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  8. Yokoo, M., Sakurai, Y., Matsubara, S.: Robust Double Auction Protocol against False-name Bids. Decision Support Systems 39, 241–252 (2005)

    Article  Google Scholar 

  9. Omote, K., Miyaji, A.: A practical english auction with one-time registration. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 221–234. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  10. Peng, K., Boyd, C., Dawson, E., Viswanathan, K.: Robust, privacy protecting and publicly verifiable sealed-bid auction. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 147–159. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  11. Vickrey, W.: Counterspeculation, Auction, and Competitive Sealed Tenders. Journal of Finance 16(1), 8–37 (1961)

    Article  Google Scholar 

  12. Wang, C., Leung, F.: Secure Double Auction Protocols with Full Privacy Protection. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 215–229. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ha, J., Zhou, J., Moon, S. (2005). An Improved Double Auction Protocol Against False Bids. In: Katsikas, S., López, J., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537878_28

Download citation

  • DOI: https://doi.org/10.1007/11537878_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28224-2

  • Online ISBN: 978-3-540-31796-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics