ABSTRACT
Combinatorial auctions are a research hot spot. They impact people's daily lives in many applications such as spectrum auctions held by the FCC. In such auctions, bidders may want to submit bids for combinations of goods. The challenge is how to protect the privacy of bidding prices and ensure data security in these auctions?
To tackle this challenge, we present an approach based on verifiable secret sharing. The approach is to represent the price in the degree of a polynomial; thus the maximum/sum of the degree of two polynomials can be obtained by the degree of the sum/product of the two polynomials based on secret sharing. This protocol hides the information of bidders (bidding price) from the auction servers. The auctioneers can obtain their secret shares from bidders without a secure channel. Since it doesn't need a secure channel, this scheme is more practical and applicable to more scenarios. This scheme provides resistance to collusion attacks, conspiracy attacks, passive attacks and so on. Compared to [11, 12], our proposed scheme provides authentication without increasing the communication cost.
- R. Bellman. Dynamic programming and lagrange multipliers. Proceedings of the National Academy of Sciences of the United States of America, 42(10):767, 1956.Google ScholarCross Ref
- C. Cachin. Efficient private bidding and auctions with an oblivious third party. In Proceedings of the 6th ACM conference on Computer and communications security, pages 120--127. ACM, 1999. Google ScholarDigital Library
- S. De Vries and R. V. Vohra. Combinatorial auctions: A survey. INFORMS Journal on computing, 15(3):284--309, 2003. Google ScholarDigital Library
- M. Dehkordi and S. Mashhadi. An efficient threshold verifiable multi-secret sharing. Computer Standards & Interfaces, 30(3):187--190, 2008. Google ScholarDigital Library
- C. Hu, X. Cheng, F. Zhang, D. Wu, X. Liao, and D. Chen. Opfka: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In INFOCOM, 2013 Proceedings IEEE, pages 2274--2282. IEEE, 2013.Google ScholarCross Ref
- C. Hu, X. Liao, and X. Cheng. Verifiable multi-secret sharing based on lrsr sequences. Theoretical Computer Science, 445:52--62, August 2012. Google ScholarDigital Library
- C. Hu, X. Liao, and D. Xiao. Secret image sharing based on chaotic map and chinese remainder theorem. International Journal of Wavelets, Multiresolution and Information Processing, 10(03):1250023(1--18), May 2012.Google Scholar
- C. Hu, F. Zhang, T. Xiang, H. Li, X. Xiao, and G. Huang. A practically optimized implementation of attribute based cryptosystems. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pages 197--204. IEEE, 2014. Google ScholarDigital Library
- C. Hu, N. Zhang, H. Li, X. Cheng, and X. Liao. Body area network security: A fuzzy attribute-based signcryption scheme. Selected Areas in Communications, IEEE Journal on, 31(9):37--46, 2013.Google Scholar
- Q. Huang, Y. Tao, and F. Wu. Spring: A strategy-proof and privacy preserving spectrum auction mechanism. In INFOCOM, 2013 Proceedings IEEE, pages 827--835. IEEE, 2013.Google ScholarCross Ref
- H. Kikuchi. (m+1) st-price auction protocol. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 85(3):676--683, 2002.Google Scholar
- K. Kobayashi, H. Morita, K. Suzuki, and M. Hakuta. Efficient sealed-bid auction by using one-way functions. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 84(1):289--294, 2001.Google Scholar
- M. Nojoumian and D. R. Stinson. Efficient sealed-bid auction protocols using verifiable secret sharing. In Information Security Practice and Experience, pages 302--317. Springer, 2014. Google ScholarDigital Library
- P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in cryptology - EUROCRYPT'99, pages 223--238. Springer, 1999. Google ScholarDigital Library
- M. Pan, J. Sun, and Y. Fang. Purging the back-room dealing: Secure spectrum auction leveraging paillier cryptosystem. Selected Areas in Communications, IEEE Journal on, 29(4):866--876, 2011. Google ScholarDigital Library
- M. Pan, X. Zhu, and Y. Fang. Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer. Wireless Networks, 18(2):113--128, 2012. Google ScholarDigital Library
- M. H. Rothkopf, A. Peke\vc, and R. M. Harstad. Computationally manageable combinational auctions. Management science, 44(8):1131--1147, 1998. Google ScholarDigital Library
- K. Sako. Universally verifiable auction protocol which hides losing bids. Proceedings of Public Key Cryptography 2000, pages 35--39, 2000. Google ScholarDigital Library
- A. Shamir. How to share a secret. Communications of the ACM, 22(11):612--613, 1979. Google ScholarDigital Library
- K. Suzuki, K. Kobayashi, and H. Morita. Efficient sealed-bid auction using hash chain. In Information Security and Cryptology - ICISC 2000, pages 183--191. Springer, 2001. Google ScholarCross Ref
- K. Suzuki and M. Yokoo. Secure combinatorial auctions by dynamic programming with polynomial secret sharing. In Financial Cryptography, pages 44--56. Springer, 2003. Google ScholarCross Ref
Index Terms
- Secure Auctions without an Auctioneer via Verifiable Secret Sharing
Recommendations
Robust Auctions for Revenue via Enhanced Competition
In “Robust Auctions for Revenue via Enhanced Competition,” T. Roughgarden, I. Talgam-Cohen, and Q. Yan revisit the classic Bulow–Klemperer result. This result compares the revenues of two well-known auction formats: the welfare-maximizing Vickrey auction ...
FAST: Fair Auctions via Secret Transactions
Applied Cryptography and Network SecurityAbstractSealed-bid auctions are a common way of allocating an asset among a set of parties but require trusting an auctioneer who analyses the bids and determines the winner. Many privacy-preserving computation protocols for auctions have been proposed to ...
Rejection prices and an auctioneer with non-monotonic utility
AbstractThis paper considers an auctioneer who has a non-monotonic utility function with a unique maximizer. The auctioneer is able to reject all bids over some amount by using rejection prices. We show that the optimal rejection price for such an ...
Comments