Abstract
One of the recent focus within the auction field has been multi-attribute auctions where buyer is not restricted to selecting the best option only by price but also other attributes. Due to the increase in the awareness of securing private information, in this paper, we design a secure reverse multi-attribute first-price auction scheme, in which the auction is processed on the bidders’ encrypted bids by multiple auctioneer servers. As a result, auctioneer servers can determine the winner without knowing the real value of bids, which let bidder’s privacy would not be revealed. At last, an analysis on the privacy of bids is conducted.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bellantuono, N., Ettorre, D., Kersten, G.E., Pontrandolfo, P.: Multi-attribute auction and negotiation for e-procurement of logistics. Group Decis. Negot. 23(3), 421–441 (2014)
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 1–10. ACM (1988)
Chen, Y., Qiu, L., Cao, T., Hu, Z.: A multi-attribute reverse auction decision making model based on multi-objective programming. In: Xu, J., Cruz-Machado, V.A., Lev, B., Nickel, S. (eds.) Proceedings of the Eighth International Conference on Management Science and Engineering Management. AISC, vol. 280, pp. 73–81. Springer, Heidelberg (2014). doi:10.1007/978-3-642-55182-6_7
Damgård, I., Koprowski, M.: Practical threshold RSA signatures without a trusted dealer. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 152–165. Springer, Heidelberg (2001). doi:10.1007/3-540-44987-6_10
Fouque, P.-A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 90–104. Springer, Heidelberg (2001). doi:10.1007/3-540-45472-1_7
Kikuchi, H., Hotta, S., Abe, K., Nakanishi, S.: Distributed auction servers resolving winner and winning bid without revealing privacy of bids. In: Seventh International Conference on Parallel and Distributed Systems: Workshops, pp. 307–312. IEEE (2000)
Larson, M., Hu, C., Li, R., Li, W., Cheng, X.: Secure auctions without an auctioneer via verifiable secret sharing. In: Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, pp. 1–6. ACM (2015)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Shi, W.: A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy. Secur. Commun. Netw. 6(10), 1281–1289 (2013)
Srinath, T., Kella, S., Jenamani, M.: A new secure protocol for multi-attribute multi-round e-reverse auction using online trusted third party. In: 2011 Second International Conference on Emerging Applications of Information Technology (EAIT), pp. 149–152. IEEE (2011)
Srinath, T., Singh, M.P., Pais, A.R.: Anonymity and verifiability in multi-attribute reverse auction. arXiv preprint (2011). arXiv:1109.0359
Suzuki, K., Yokoo, M.: Secure multi-attribute procurement auction. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 306–317. Springer, Heidelberg (2006). doi:10.1007/11604938_24
Acknowledgement
The authors thank the editors and the anonymous reviewers for their valuable comments. This research was supported by National Natural Science Foundation of China (Nos.61472074, 61401083), the Doctoral Fund of Northeastern University of Qinhuangdao (Grant No. XNB201410); the Fundamental Research Funds for the Central Universities (Grant No. N130323005, L1523009); the Natural Science Foundation of Hebei Province of China (Grant No. F2014501139, F2015501122); the Doctoral Scientific Research Foundation of Liaoning Province (Grant No. F201501143).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Gao, J., Wang, J., Lu, N., Zhu, F., Shi, W. (2016). A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress). In: Chen, L., Han, J. (eds) Provable Security. ProvSec 2016. Lecture Notes in Computer Science(), vol 10005. Springer, Cham. https://doi.org/10.1007/978-3-319-47422-9_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-47422-9_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47421-2
Online ISBN: 978-3-319-47422-9
eBook Packages: Computer ScienceComputer Science (R0)