Skip to main content

Online Auction Protocols: A Comparative Study

  • Conference paper
  • First Online:
Electronic Commerce Technologies (ISEC 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2040))

Included in the following conference series:

Abstract

Online auction is an interesting component of the electronic commerce. Goods and services that used to be sold in conventional brick-and-mortar stores at fixed prices can now be purchased online at their “true” valuations in the eyes of multiple customers. With the growing sheer number and total value of these transactions conducted under the online auction model, the actual security becomes a controversial issue. This is where cryptographic methods, some already decades old, others brand-new and specialized for the application in the realm of auctions, come into the game. This paper attempts to give an overview of the current state of affairs and convergent issues for cryptographic methods applicable to the field of on-line auctions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Christian Cachin. Efficient Private Bidding with an Oblivious Third Party. Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS 99). pp.120–126. Singapore, ACM. 1999

    Google Scholar 

  2. Matthew K. Franklin and Michael K. Reiter. The Design and Implementation of a Secure Auction Service. Proceedings of the IEEE Symposium on Security and Privacy. 1995

    Google Scholar 

  3. Michael Harkavy, J.D. Tygar and Hiroaki Kikuchi. Electronic Auctions with Private Bids. Proceedings of the 3rd USENIX Workshop on Electronic Commerce. Boston, Massachusetts. September 1998

    Google Scholar 

  4. Manoj Kumar and Stuart I. Feldman. Internet Auctions. Proceedings of the 3rd USENIX Workshop on Electronic Commerce. Boston, Massachusetts. September 1998

    Google Scholar 

  5. David Lucking-Reiley. Auctions on the Internet. What’s Being Auctioned, and How? Department of Economics. Vanderbilt University. 14th August 1999

    Google Scholar 

  6. Philip MacKenzie and Jeffrey Sorensen. Anonymous Investing. Hiding the Identities of Stockholders. Proceedings of 3rd Financial Cryptology Conference. Lecture Notes in Computer Science #1648. pp. 212–229. Springer Verlag. 1999

    Chapter  Google Scholar 

  7. Rajiv Mehrotra. Online Auctions: Just Another Fad?

    Google Scholar 

  8. H. Nurmi. Cryptographic Protocols for Auctions and Bargaining. In: Results and Trends in Theoretical Computer Sciences. Lecture Notes in Computer Science #812. pp.317–324 Springer. 1994

    Google Scholar 

  9. Srividhya Subramanian. Design and Verification of Secure E-Commerce Protocols. Dissertation at the Ohio State University. 1999

    Google Scholar 

  10. Srividhya Subramanian and Mukesh Singhal. Real-Time Aware Protocols for General E-Commerce and Electronic Auctions Transactions. Proceedings of ICDCS Workshop, June 1999

    Google Scholar 

  11. Stuart G. Stubblebine and Paul F. Syverson. Fair On-Line Auctions without Special Trusted Parties. Proceedings of 3rd Financial Cryptology Conference. Lecture Notes in Computer Science #1648. pp. 230–240. Springer Verlag. 1999

    Chapter  Google Scholar 

  12. J.D. Tygar. Atomicity in Electronic Commerce. Computer Science Department. Carnegie Mellon University. Pittsburgh, PA.

    Google Scholar 

  13. Dietmar Waetjen. Kryptologie. Lecture Notes. Institut fuer Theoretische Informatik. Technische Universitaet Braunschweig. Oktober 1999

    Google Scholar 

  14. Xiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, and Eiji Okamoto. Secure Agent-Mediated Auction-like Negotiation Protocol for Internet Retail Commerce. Lecture Notes in Computer Science #1652. pp. 291–302. Springer. 1999

    Google Scholar 

  15. A.C. Yao. Protocols for Secure Computation. 23rd Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press

    Google Scholar 

  16. Xun Yi, Xiao Feng Wang, Eiji Okamoto and D. Frank Hsu. A Secure Auction-like negotiation Protocol for Agent-based Internet Trading. pp. 197–203.

    Google Scholar 

  17. Makoto Yokoo, Yuko Sakurai and Shigeo Matsubara. The Effect of False-name Declarations in Mechanism Design: Towards Collective Decision Making on the Internet. pp.146–153

    Google Scholar 

  18. Reyne Haines, Arden Snyder, and Connie Swain. The Auction Book-1999 Guide to Online Auctions. GWB publishing, Cincinnati, Ohio, 1998

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Passch, C., Song, W., Kou, W., Tan, CJ. (2001). Online Auction Protocols: A Comparative Study. In: Kou, W., Yesha, Y., Tan, C.J. (eds) Electronic Commerce Technologies. ISEC 2001. Lecture Notes in Computer Science, vol 2040. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45415-2_14

Download citation

  • DOI: https://doi.org/10.1007/3-540-45415-2_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41963-1

  • Online ISBN: 978-3-540-45415-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics