ABSTRACT
We propose two protocol variants for a first price sealed-bid auction, without using intermediatory auctioneers. One version achieves full privacy for the bidders and their bids, the other provides a form of verifiability, at the cost of some privacy. Full privacy protects all bids. In particular the winner's identity and price are only known by the seller. Lesser privacy allows the winner to be known and verified publicly. Both versions provide non-repudiation. We demonstrate correctness and show how computational and communication costs vary with different privacy levels.
- M. Abe and K. Suzuki. M + 1st price auction using homomorphic encryption. Proc. 5th International Conference on Public Key Cryptography (PKC 02), 2002. Google ScholarDigital Library
- O. Baudron and J. Stern. Non-interactive private auctions. Proc. 5th Annual Conference on Financial Cryptography, pp. 300--313, 2001. Google ScholarDigital Library
- F. Brandt. A verifiable, bidder-resolved Auction Protocol. Proc. 5th International Workshop on Deception, Fraud and Trust in Agent Societies, pp. 18--25, 2002.Google Scholar
- C. Cachin. Efficient private bidding and auctions with an oblivious third party . Proc. 6th ACM conference on Computer and Communications Security, pp. 120--127, 1999. Google ScholarDigital Library
- Matthew K Franklin and Michael K. Reiter. The design and implementation of a secure auction service. IEEE Trans. on Software Engineering, 22(5), pp. 302--312, 1996. Google ScholarDigital Library
- M. Jakobsson and A. Juels. Mix and match: Secure function evaluation via ciphertexts. Proc. Asiacrypt 00, pp. 162--177, 2000. Google ScholarDigital Library
- A. Juels and M. Szydlo A two server, sealed bid auction. Proc. Financial Cryptography 02, 2002.Google Scholar
- H. Kikuchi, M. Harkavy and J. Tygar. Multi-round anonymous auction protocols. Proc. 1st IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pp. 62--69, 1998.Google Scholar
- H. Lipmaa, N. Asokan and V. Niemi. Secure Vickrey auctions without threshold trust. Proc. 6th Annual Conference on Financial Cryptography, 2002.Google ScholarDigital Library
- M. Naor, B. Pinkas and R. Summer. Privacy Preserving Auctions and Mechanism Design. Proc. ACM conference on E-commerce, pp. 129--139, 1999. Google ScholarDigital Library
- A. Yao. Protocols for secure computations. Proc. 27th IEEE Symposium on Foundations of Computer Science, pp. 162--167, 1986.Google Scholar
Index Terms
- First price sealed bid auction without auctioneers
Recommendations
A Study on Diverse Scholar Agents Participating in the Second Price Sealed Bid Citation Auction
SKG '08: Proceedings of the 2008 Fourth International Conference on Semantics, Knowledge and GridAn objective of this paper is to study how agents in citation auctions behave in terms of their strategies as well as how their perceptions of the Internal Private Values IPVs) impacts those strategies. These issues are studied using several auction ...
Toward a fair indictment for sealed-bid auction with self-enforcing privacy
In a sealed-bid auction, bidders simultaneously submit their sealed bids to the auctioneer without knowledge of the others' bids. The auctioneer will then declare the bidder with the highest price (or second-highest price) as the winner during the ...
Procurement Bidding in First-Price and Second-Price, Sealed-Bid Auctionswithin the Common-Value Paradigm
Within the common-value paradigm, I examine the magnitude of the difference in expected outcome between first-price and second-price, sealed-bid auctions. I limit myself to two empirical specifications of bidders' signals: Weibull and normal distribution. ...
Comments