Filters








595 Hits in 7.2 sec

Secure first-price sealed-bid auction scheme

Zhen Guo, Yu Fu, Chunjie Cao
2017 EURASIP Journal on Information Security  
In this paper, we proposed a secure auction system, in which the bids will not be revealed, and no one can fake the winning identity and the winner cannot change the winning bid.  ...  The communication cost of our scheme is low; only two rounds communication are needed between the bidders and the auctioneer. And we show that our scheme achieves the desired security requirements.  ...  How to design the fair auction scheme with privacy preserving is an important research in modern auction system.  ... 
doi:10.1186/s13635-017-0068-1 fatcat:i76ipdko25b4hlei5gjutvyka4

PP-VCA: A Privacy-Preserving and Verifiable Combinatorial Auction Mechanism

Mingwu Zhang, Bingruolan Zhou, Weizhi Meng
2020 Wireless Communications and Mobile Computing  
In order to solve this issue, this paper exploits a privacy-preserving and verifiable combinatorial auction protocol (PP-VCA) to protect bidders' privacy and ensure the correct auction price in a secure  ...  protocol, to implement the combinatorial auction with bidder privacy and payment verifiability.  ...  Homomorphic encryption provides an available approach to protect each bidding value with a vector of ciphertext and then guarantees the auctioneer to figure out the maximum value securely [16] [17] [18  ... 
doi:10.1155/2020/8888284 fatcat:w7pgktwvxrbhvda2kizvjgzoa4

PPER: Privacy-preserving economic-robust spectrum auction in wireless networks

Ming Li, Pan Li, Linke Guo, Xiaoxia Huang
2015 2015 IEEE Conference on Computer Communications (INFOCOM)  
Thus, it is critical to protect bids from the auctioneer in an auction. With this goal, we develop a Privacy-Preserving Economic-Robust spectrum auction scheme, namely PPER.  ...  However, most of them assume the auctioneer is trustful and do not protect users' interests. An auctioneer can manipulate the winner's charging price if it knows users' bids.  ...  Then, a privacy-preserving auction scheme is proposed to protect the STs' bid privacy.  ... 
doi:10.1109/infocom.2015.7218462 dblp:conf/infocom/00060GH15 fatcat:4mxgzmmclbdfngbb4yii54bt4e

Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing [chapter]

Mehrdad Nojoumian, Douglas R. Stinson
2014 Lecture Notes in Computer Science  
The main reason for constructing secure auction protocols is that the losing bids can be used in the future auctions as well as negotiations if they are not kept private.  ...  We initially propose two secure second-price auction protocols with different masking methods.  ...  This problem can be resolved by constructing privacy-preserving auction protocols.  ... 
doi:10.1007/978-3-319-06320-1_23 fatcat:fa325nsns5dipmjyin3mc6jfam

Privacy-Preserving English Auction Protocol with Round Efficiency [article]

Hu Xiong, Zhong Chen
2010 arXiv   pre-print
A privacy-preserving English auction protocol with round efficiency based on a modified ring signature has been proposed in this paper.  ...  of auctioneer and registration manager can reveal the true identity of a malicious bidder.  ...  s protocol is much more costly than the previously protocols. In this paper, we propose an English auction protocol with privacy-preserving based on revocable ring signature [23] .  ... 
arXiv:1010.5642v1 fatcat:zg4y2tfimbck3bz2kkov2cpcdi

BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications

Rohit Das, Sanjeet Nayak, Sourav Bhoi, Suman Choudhury, Banshidhar Majhi, Sujata Mohanty
2016 Computers  
Any auction protocol must not leak the anonymity and the privacy of the bid value of an honest Bidder.  ...  Even so, security and robustness of e-auction schemes still remain a challenge. Requirements like anonymity and privacy of the bid value are under threat from the attackers.  ...  Acknowledgments: We want to thank the Department of Computer Science and Engineering of the National Institute of Technology, Rourkela, India for providing infrastructure to conduct the experiments.  ... 
doi:10.3390/computers5040032 fatcat:lpbnneykvfhevevshyovqfwkci

Implementation of Cryptography for Privacy Preserving Data Mining

Anand Sharma, Vibha Ojha
2010 International Journal of Database Management Systems  
Privacy preserving data mining algorithms have been recently introduced with the aim of preventing the discovery of sensible information.  ...  For that privacy secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results.  ...  The auction scenario is that of a "sealed bid" auction, and consists of an auctioneer and many bidders. Each bidder submits a single secret bid (i.e. the bid is sealed in an envelope).  ... 
doi:10.5121/ijdms.2010.2306 fatcat:t7f7y4crkrflbbw7gvzj5to2l4

PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms [article]

He Huang and Xiang-Yang Li and Yu-e Sun and Hongli Xu and Liusheng Huang
2013 arXiv   pre-print
In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework.  ...  design strategyproof auction mechanisms with privacy preserving based on them.  ...  [11] first propose a strategyproof spectrum auction with consideration of privacy preserving, and Pan et al. [21] provide  ... 
arXiv:1307.7792v1 fatcat:b32bm4irybenxjsi6eh5dxkoqe

How to obtain full privacy in auctions

Felix Brandt
2006 International Journal of Information Security  
Privacy has become a factor of increasing importance in auction design.  ...  The resulting protocols require just three rounds of bidder broadcasting in the random oracle model. Communication complexity is linear in the number of possible bids.  ...  Acknowledgements Thanks to Jens Groth for some valuable comments on an earlier version of this. Further thanks to Alina Oprea, Ke Yang, and the anonymous referees for helpful feedback.  ... 
doi:10.1007/s10207-006-0001-y fatcat:nomi66qgp5gwxhkzkoknblfktq

Efficient Two-Party Integer Comparison with Block Vectorization Mechanism

Thai-Hung Nguyen, Kok-Seng WOng, Thomas Oikonomou
2021 IEEE Access  
Private integer comparison has been an essential computation function for many applications, including online auction, credential identification, data mining, and joint bidding.  ...  INDEX TERMS Private integer comparison, data privacy, secure two-party computation, semi-honest protocol.  ...  In particular, the sealed-bid auctions require submitted bids to remain private to protect the privacy of the losing bidders.  ... 
doi:10.1109/access.2021.3110055 fatcat:xx6gxehut5f5te4zordwr5gbpa

PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms

He Huang, Xiang-Yang Li, Yu-e Sun, Hongli Xu, Liusheng Huang
2015 IEEE Transactions on Parallel and Distributed Systems  
In this paper, we propose PPS, a Privacy Preserving Strategyproof spectrum auction framework.  ...  judiciously design strategyproof auction mechanisms with privacy preserving based on them.  ...  The research of authors is partially supported by NSF CNS-0832120, NSF  ... 
doi:10.1109/tpds.2014.2315200 fatcat:thrsz6mq45fjdd3vcjahmyihym

Three-Party Integer Comparison and Applications [article]

Jie Ma, Bin Qi, Kewei Lv
2021 arXiv   pre-print
Basing on TPIC, we present multi-party comparisons through concrete applications, including a joint bidding scheme and a practical auction.  ...  In comparison, our auction scheme is more efficient with lower cost, making it feasible in practice rather than a theoretical design.  ...  Our auction scheme is secure against mixed adversary (A 1 , A 2 ), where A 1 may corrupt the auctioneer A, A 2 may corrupt one or more bidders. I.e., the bid privacy of honest bidders is preserved.  ... 
arXiv:2105.00625v1 fatcat:wffo725zxzfzbbpksustww2qva

A practical solution for sealed bid and multi-currency auctions

Jose A. Montenegro, Javier Lopez
2014 Computers & security  
These proofs make it possible to verify the correctness of the functions whilst preserving the privacy of the bid values.  ...  This paper introduces a sealed bid and multi-currency auction using secure multiparty computation (SMC).  ...  The main goal of the proposal is to preserve the privacy of the maximum bid.The proposal Nakanishi et al. (2004) deals with a common problem of SMC protocols and proposes an SMC protocol where the bidder  ... 
doi:10.1016/j.cose.2014.06.004 fatcat:snb6ftjiwngx5cdtw4fvj3ks4i

Applications of Economic and Pricing Models for Wireless Network Security: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Zhu Han
2017 arXiv   pre-print
Additionally, we discuss integrating economic and pricing models with cryptography methods to reduce information privacy leakage as well as to guarantee the confidentiality and integrity of information  ...  This paper provides a comprehensive literature review on applications of economic and pricing theory to security issues in wireless networks.  ...  Fig. 12 . 12 Privacy preserving protocol for bidders with the help of the CA. Fig. 13 . 13 Bid's integrity in MANET based on the (k, n)-threshold cryptography scheme.  ... 
arXiv:1707.07846v1 fatcat:xb3jvolwmjad7oxdefdd2pq7dq

PASTRAMI: Privacy-preserving, Auditable, Scalable Trustworthy Auctions for Multiple Items [article]

Michał Król, Alberto Sonnino, Argyrios Tasiopoulos, Ioannis Psaras, Etienne Rivière
2020 arXiv   pre-print
We present PASTRAMI, a decentralised platform enabling trustworthy assignments of items and prices between a large number of sellers and bidders, through the support of multi-item auctions.  ...  PASTRAMI uses threshold blind signatures and commitment schemes to provide strong privacy guarantees while making bidders accountable.  ...  Strain uses a two-party comparison protocol based on Secure Multi-Party Computation (MPC), but has a flaw that reveals the order of bids.  ... 
arXiv:2004.06403v3 fatcat:saeyrp7hwzbv7kyqss4yxuf2lq
« Previous Showing results 1 — 15 out of 595 results