A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure first-price sealed-bid auction scheme
2017
EURASIP Journal on Information Security
In this paper, we proposed a secure auction system, in which the bids will not be revealed, and no one can fake the winning identity and the winner cannot change the winning bid. ...
The communication cost of our scheme is low; only two rounds communication are needed between the bidders and the auctioneer. And we show that our scheme achieves the desired security requirements. ...
How to design the fair auction scheme with privacy preserving is an important research in modern auction system. ...
doi:10.1186/s13635-017-0068-1
fatcat:i76ipdko25b4hlei5gjutvyka4
PP-VCA: A Privacy-Preserving and Verifiable Combinatorial Auction Mechanism
2020
Wireless Communications and Mobile Computing
In order to solve this issue, this paper exploits a privacy-preserving and verifiable combinatorial auction protocol (PP-VCA) to protect bidders' privacy and ensure the correct auction price in a secure ...
protocol, to implement the combinatorial auction with bidder privacy and payment verifiability. ...
Homomorphic encryption provides an available approach to protect each bidding value with a vector of ciphertext and then guarantees the auctioneer to figure out the maximum value securely [16] [17] [18 ...
doi:10.1155/2020/8888284
fatcat:w7pgktwvxrbhvda2kizvjgzoa4
PPER: Privacy-preserving economic-robust spectrum auction in wireless networks
2015
2015 IEEE Conference on Computer Communications (INFOCOM)
Thus, it is critical to protect bids from the auctioneer in an auction. With this goal, we develop a Privacy-Preserving Economic-Robust spectrum auction scheme, namely PPER. ...
However, most of them assume the auctioneer is trustful and do not protect users' interests. An auctioneer can manipulate the winner's charging price if it knows users' bids. ...
Then, a privacy-preserving auction scheme is proposed to protect the STs' bid privacy. ...
doi:10.1109/infocom.2015.7218462
dblp:conf/infocom/00060GH15
fatcat:4mxgzmmclbdfngbb4yii54bt4e
Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing
[chapter]
2014
Lecture Notes in Computer Science
The main reason for constructing secure auction protocols is that the losing bids can be used in the future auctions as well as negotiations if they are not kept private. ...
We initially propose two secure second-price auction protocols with different masking methods. ...
This problem can be resolved by constructing privacy-preserving auction protocols. ...
doi:10.1007/978-3-319-06320-1_23
fatcat:fa325nsns5dipmjyin3mc6jfam
Privacy-Preserving English Auction Protocol with Round Efficiency
[article]
2010
arXiv
pre-print
A privacy-preserving English auction protocol with round efficiency based on a modified ring signature has been proposed in this paper. ...
of auctioneer and registration manager can reveal the true identity of a malicious bidder. ...
s protocol is much more costly than the previously protocols. In this paper, we propose an English auction protocol with privacy-preserving based on revocable ring signature [23] . ...
arXiv:1010.5642v1
fatcat:zg4y2tfimbck3bz2kkov2cpcdi
BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications
2016
Computers
Any auction protocol must not leak the anonymity and the privacy of the bid value of an honest Bidder. ...
Even so, security and robustness of e-auction schemes still remain a challenge. Requirements like anonymity and privacy of the bid value are under threat from the attackers. ...
Acknowledgments: We want to thank the Department of Computer Science and Engineering of the National Institute of Technology, Rourkela, India for providing infrastructure to conduct the experiments. ...
doi:10.3390/computers5040032
fatcat:lpbnneykvfhevevshyovqfwkci
Implementation of Cryptography for Privacy Preserving Data Mining
2010
International Journal of Database Management Systems
Privacy preserving data mining algorithms have been recently introduced with the aim of preventing the discovery of sensible information. ...
For that privacy secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. ...
The auction scenario is that of a "sealed bid" auction, and consists of an auctioneer and many bidders. Each bidder submits a single secret bid (i.e. the bid is sealed in an envelope). ...
doi:10.5121/ijdms.2010.2306
fatcat:t7f7y4crkrflbbw7gvzj5to2l4
PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms
[article]
2013
arXiv
pre-print
In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. ...
design strategyproof auction mechanisms with privacy preserving based on them. ...
[11] first propose a strategyproof spectrum auction with consideration of privacy preserving, and Pan et al. [21] provide ...
arXiv:1307.7792v1
fatcat:b32bm4irybenxjsi6eh5dxkoqe
How to obtain full privacy in auctions
2006
International Journal of Information Security
Privacy has become a factor of increasing importance in auction design. ...
The resulting protocols require just three rounds of bidder broadcasting in the random oracle model. Communication complexity is linear in the number of possible bids. ...
Acknowledgements Thanks to Jens Groth for some valuable comments on an earlier version of this. Further thanks to Alina Oprea, Ke Yang, and the anonymous referees for helpful feedback. ...
doi:10.1007/s10207-006-0001-y
fatcat:nomi66qgp5gwxhkzkoknblfktq
Efficient Two-Party Integer Comparison with Block Vectorization Mechanism
2021
IEEE Access
Private integer comparison has been an essential computation function for many applications, including online auction, credential identification, data mining, and joint bidding. ...
INDEX TERMS Private integer comparison, data privacy, secure two-party computation, semi-honest protocol. ...
In particular, the sealed-bid auctions require submitted bids to remain private to protect the privacy of the losing bidders. ...
doi:10.1109/access.2021.3110055
fatcat:xx6gxehut5f5te4zordwr5gbpa
PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms
2015
IEEE Transactions on Parallel and Distributed Systems
In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework. ...
judiciously design strategyproof auction mechanisms with privacy preserving based on them. ...
The research of authors is partially supported by NSF CNS-0832120, NSF ...
doi:10.1109/tpds.2014.2315200
fatcat:thrsz6mq45fjdd3vcjahmyihym
Three-Party Integer Comparison and Applications
[article]
2021
arXiv
pre-print
Basing on TPIC, we present multi-party comparisons through concrete applications, including a joint bidding scheme and a practical auction. ...
In comparison, our auction scheme is more efficient with lower cost, making it feasible in practice rather than a theoretical design. ...
Our auction scheme is secure against mixed adversary (A 1 , A 2 ), where A 1 may corrupt the auctioneer A, A 2 may corrupt one or more bidders. I.e., the bid privacy of honest bidders is preserved. ...
arXiv:2105.00625v1
fatcat:wffo725zxzfzbbpksustww2qva
A practical solution for sealed bid and multi-currency auctions
2014
Computers & security
These proofs make it possible to verify the correctness of the functions whilst preserving the privacy of the bid values. ...
This paper introduces a sealed bid and multi-currency auction using secure multiparty computation (SMC). ...
The main goal of the proposal is to preserve the privacy of the maximum bid.The proposal Nakanishi et al. (2004) deals with a common problem of SMC protocols and proposes an SMC protocol where the bidder ...
doi:10.1016/j.cose.2014.06.004
fatcat:snb6ftjiwngx5cdtw4fvj3ks4i
Applications of Economic and Pricing Models for Wireless Network Security: A Survey
[article]
2017
arXiv
pre-print
Additionally, we discuss integrating economic and pricing models with cryptography methods to reduce information privacy leakage as well as to guarantee the confidentiality and integrity of information ...
This paper provides a comprehensive literature review on applications of economic and pricing theory to security issues in wireless networks. ...
Fig. 12 . 12 Privacy preserving protocol for bidders with the help of the CA.
Fig. 13 . 13 Bid's integrity in MANET based on the (k, n)-threshold cryptography scheme. ...
arXiv:1707.07846v1
fatcat:xb3jvolwmjad7oxdefdd2pq7dq
PASTRAMI: Privacy-preserving, Auditable, Scalable Trustworthy Auctions for Multiple Items
[article]
2020
arXiv
pre-print
We present PASTRAMI, a decentralised platform enabling trustworthy assignments of items and prices between a large number of sellers and bidders, through the support of multi-item auctions. ...
PASTRAMI uses threshold blind signatures and commitment schemes to provide strong privacy guarantees while making bidders accountable. ...
Strain uses a two-party comparison protocol based on Secure Multi-Party Computation (MPC), but has a flaw that reveals the order of bids. ...
arXiv:2004.06403v3
fatcat:saeyrp7hwzbv7kyqss4yxuf2lq
« Previous
Showing results 1 — 15 out of 595 results