skip to main content
10.1145/1280940.1280967acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
Article

First price sealed bid auction without auctioneers

Authors Info & Claims
Published:12 August 2007Publication History

ABSTRACT

We propose two protocol variants for a first price sealed-bid auction, without using intermediatory auctioneers. One version achieves full privacy for the bidders and their bids, the other provides a form of verifiability, at the cost of some privacy. Full privacy protects all bids. In particular the winner's identity and price are only known by the seller. Lesser privacy allows the winner to be known and verified publicly. Both versions provide non-repudiation. We demonstrate correctness and show how computational and communication costs vary with different privacy levels.

References

  1. M. Abe and K. Suzuki. M + 1st price auction using homomorphic encryption. Proc. 5th International Conference on Public Key Cryptography (PKC 02), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. O. Baudron and J. Stern. Non-interactive private auctions. Proc. 5th Annual Conference on Financial Cryptography, pp. 300--313, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. F. Brandt. A verifiable, bidder-resolved Auction Protocol. Proc. 5th International Workshop on Deception, Fraud and Trust in Agent Societies, pp. 18--25, 2002.Google ScholarGoogle Scholar
  4. C. Cachin. Efficient private bidding and auctions with an oblivious third party . Proc. 6th ACM conference on Computer and Communications Security, pp. 120--127, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Matthew K Franklin and Michael K. Reiter. The design and implementation of a secure auction service. IEEE Trans. on Software Engineering, 22(5), pp. 302--312, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Jakobsson and A. Juels. Mix and match: Secure function evaluation via ciphertexts. Proc. Asiacrypt 00, pp. 162--177, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Juels and M. Szydlo A two server, sealed bid auction. Proc. Financial Cryptography 02, 2002.Google ScholarGoogle Scholar
  8. H. Kikuchi, M. Harkavy and J. Tygar. Multi-round anonymous auction protocols. Proc. 1st IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pp. 62--69, 1998.Google ScholarGoogle Scholar
  9. H. Lipmaa, N. Asokan and V. Niemi. Secure Vickrey auctions without threshold trust. Proc. 6th Annual Conference on Financial Cryptography, 2002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Naor, B. Pinkas and R. Summer. Privacy Preserving Auctions and Mechanism Design. Proc. ACM conference on E-commerce, pp. 129--139, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Yao. Protocols for secure computations. Proc. 27th IEEE Symposium on Foundations of Computer Science, pp. 162--167, 1986.Google ScholarGoogle Scholar

Index Terms

  1. First price sealed bid auction without auctioneers

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IWCMC '07: Proceedings of the 2007 international conference on Wireless communications and mobile computing
        August 2007
        716 pages
        ISBN:9781595936950
        DOI:10.1145/1280940

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 August 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader