261 Hits in 5.6 sec

Privacy-Enhancing Auctions Using Rational Cryptography [chapter]

Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos
2009 Lecture Notes in Computer Science  
We show how to use rational cryptography to approximately implement any given ex interim individually strictly rational equilibrium of such an auction without a trusted mediator through a cryptographic  ...  We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, our assumption being that bidders  ...  Rational Auctions for Internet-Like Networks We now present our Internet-based and privacy-enhanced Nash-equilibrium protocol for realizing auctions. Assigning value to signed contracts.  ... 
doi:10.1007/978-3-642-03356-8_32 fatcat:3inwkzhuvfffzpebmeh5vqk6r4

Privacy-enhancing auctions using rational cryptography

Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos
2010 Proceedings of the Behavioral and Quantitative Game Theory on Conference on Future Directions - BQGT '10  
Privacy-enhancing auctions using rational cryptography © P. B. Miltersen, J. B. Nielsen, N.  ...  spaces A T Presented at CRYPTO 2009 Privacy-enhancing auctions using rational cryptography © P.  ...  privacy-enhancing auctions ! first example on practical rational MPC in Internet-like settings ! inherent limitations (1 st Vs. 2 nd price auction separation) !  ... 
doi:10.1145/1807406.1807496 dblp:conf/bqgt/MiltersenNT10 fatcat:w53oyyannfazzaj2fzn7qjmvfm

Security and Privacy Challenges for Internet-of-Things and Fog Computing

Ximeng Liu, Yang Yang, Kim-Kwang Raymond Choo, Huaqun Wang
2018 Wireless Communications and Mobile Computing  
Identity/Attribute-Based Cryptography Identity-based cryptography is an attractive branch of public key cryptography which uses the public known information (such as, an email address or a physical IP  ...  Although the traditional cloud-based platform can even use heavyweight cryptosystem to enhance the security, it cannot be performed on the resource-constrained fog devices directly.  ... 
doi:10.1155/2018/9373961 fatcat:dtklqr7jtze77kap57kckntmmy

General Privacy-Preserving Verifiable Incentive Mechanism for Crowdsourcing Markets [article]

Jiajun Sun
2014 arXiv   pre-print
Their mechanisms are very useful to motivate extensive user to truthfully participate in crowdsourcing markets.  ...  To this end, recently, Singer et al. propose a novel class of auction mechanisms for determining near-optimal prices of tasks for crowdsourcing markets constrained by the given budget.  ...  The authors of [3] use a timed lapse cryptography service to keep users' bids secret from the auctioneer before the auction closed, and prevent them from rigging their bid after bidding.  ... 
arXiv:1311.5417v3 fatcat:fcb6a56aj5glxosovadpy2ignm

Fostering the Uptake of Secure Multiparty Computation in E-Commerce

Octavian Catrina, Florian Kerschbaum
2008 2008 Third International Conference on Availability, Reliability and Security  
Novel e-commerce applications have emerged that could benefit from strong privacy protection, e.g., benchmarking, auctions, and collaborative supply chain management and planning.  ...  Overcoming these obstacles should benefit both consumers and producers and enable better privacy.  ...  We reviewed current security models and methods used for SMC protocols, and analyzed them for practical applicability in e-commerce applications.  ... 
doi:10.1109/ares.2008.49 dblp:conf/IEEEares/CatrinaK08 fatcat:7gwzztzmxbeyja7vy3mqkpahta

Towards Privacy Preservation in Strategy-Proof Spectrum Auction Mechanisms for Noncooperative Wireless Networks

Fan Wu, Qianyi Huang, Yixin Tao, Guihai Chen
2015 IEEE/ACM Transactions on Networking  
PRIDE guarantees -anonymity for both single-and multiple-channel auctions. Furthermore, we enhance PRIDE to provide -diversity, which is an even stronger privacy protection than -anonymity.  ...  However, none of these approaches protects bidders' privacy. In this paper, we present PRIDE, which is a PRIvacy-preserving anD stratEgy-proof spectrum auction mechanism.  ...  Her research interests lie in privacy preservation and resource management in wireless networks. Miss Huang is a student member of the Association for Computing Machinery (ACM) and CCF.  ... 
doi:10.1109/tnet.2014.2322104 fatcat:khpzdod3i5dw5lnm2h3c25rhrq

Applications of Economic and Pricing Models for Wireless Network Security: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Zhu Han
2017 arXiv   pre-print
Additionally, we discuss integrating economic and pricing models with cryptography methods to reduce information privacy leakage as well as to guarantee the confidentiality and integrity of information  ...  In this section, we present the background of the economic and pricing models as well as the rationale behind their use to enhance the wireless security.  ...  In cryptography, a nonce is an arbitrary number which may only be used once.  ... 
arXiv:1707.07846v1 fatcat:xb3jvolwmjad7oxdefdd2pq7dq

Stackelberg Security Game For Optimizing Security Of Federated Internet Of Things Platform Instances

Violeta Damjanovic-Behrendt
2017 Zenodo  
For example, the authors in [36] propose the Secure Auction-based Routing (SAR) protocol, which uses the First-Price auctions to isolate suspicious sensor nodes.  ...  Some novel approaches for security in cloud computing add more intelligence in the data itself using, i.e. the framework of Trusted Computing (TC) and privacy enhanced business intelligence that implements  ... 
doi:10.5281/zenodo.1130143 fatcat:ioupac6cbvaz3lftjcptnz5aru

When Blockchain Meets Auction Models: A Survey, Some Applications, and Challenges [article]

Zeshun Shi, Cees de Laat, Paola Grosso, Zhiming Zhao
2021 arXiv   pre-print
On the one hand, the decentralized nature of blockchain can provide a trustworthy, secure, and cost-effective mechanism to manage the auction process; on the other hand, auction models can be utilized  ...  Complementary features between blockchain and auction models trigger a great potential for research and innovation.  ...  using cryptographic proofs. [222] [223] Auctionity is a blockchain-based English auction protocol built on Ethereum, in which ECDSA and non-fungible tokens are leveraged to enhance security and privacy  ... 
arXiv:2110.12534v1 fatcat:tpy2cv7sz5dc3dpchnmrniab5e

Two and Three-Party Digital Goods Auctions: Scalable Privacy Analysis [article]

Patrick Ah-Fat, Michael Huth
2020 arXiv   pre-print
In this work, we aim at scaling those privacy analyses to large input spaces in the particular case of digital goods auctions.  ...  We derive closed-form formulas for the posterior min-entropy of private inputs in two and three-party auctions, which enables us to effectively quantify the information leaks for arbitrarily large input  ...  Conclusion Digital goods auctions are one real world use case that can benefit from the security guarantees that Secure Multi-Party Computation has to offer.  ... 
arXiv:2009.09524v1 fatcat:h5isewanjrhjfagsvpytchir3y

Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization [article]

Zhili Chen, Tianjiao Ni, Hong Zhong, Shun Zhang, Jie Cui
2018 arXiv   pre-print
Recently, a few differentially private spectrum auction mechanisms have been proposed, but, as far as we know, none of them addressed the differential privacy in the setting of double spectrum auctions  ...  In this paper, we combine the concept of differential privacy with double spectrum auction design, and present a Differentially private Double spectrum auction mechanism with approximate Social welfare  ...  For double spectrum auctions, papers [5] , [6] employed various cryptography techniques to achieve privacy preservation.  ... 
arXiv:1810.07873v1 fatcat:dboior4ulnfyzhufd7s7vax7gu

A Privacy-Preserving Incentive Mechanism for Data Offloading in Satellite-Terrestrial Crowdsensing

Boxiang Zhu, Jiarui Li, Zhongkai Liu, Yang Liu, Chi Lin
2021 Wireless Communications and Mobile Computing  
What is more, we have considered long-term privacy protection goals. We employ reverse combinatorial auction and Lyapunov optimization theorem to jointly optimize queue stability and total payment.  ...  To this end, we propose an algorithm known as differential private long-term privacy-preserving auction with Lyapunov stochastic theory (DP-LAL) for data offloading based on satellite-terrestrial architecture  ...  A cryptography-based perspective is also one important way to protect privacy. Zhang et al.  ... 
doi:10.1155/2021/1951095 fatcat:av7fxdthenccxagsv3e2czgi2a

Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Maaz Rehan, Jinjun Chen
2021 arXiv   pre-print
In order to preserve this privacy leakage, various privacy preserving strategies have been developed by researchers, and according to us differential privacy is the most significant among them.  ...  Various capabilities of CR nodes depend upon efficient and continuous reporting of data with each other and centralized base stations, which in turn can cause leakage in privacy.  ...  For example, in auction, differential privacy has been used in auction to protect bid privacy. Similarly, it has been used in SS to protect location privacy.  ... 
arXiv:2111.02011v2 fatcat:a5hique4fvfxrclslvpgda5jyy

Privacy-Preserving Verifiable Incentive Mechanism for Crowdsourcing Market Applications [article]

Jiajun Sun
2014 arXiv   pre-print
Although it is so important, there still exists many verification and privacy challenges, including users' bids and subtask information privacy and identification privacy, winners' set privacy of the platform  ...  Results indicate that our privacy-preserving verifiable incentive mechanism achieves the same results as the generic one without privacy preservation.  ...  The authors of [Parkes et al. 2008 ] use a timed lapse cryptography service to keep users' bids secret from the platform before the auction closed, and prevent them from rigging their bids after bidding  ... 
arXiv:1311.6230v7 fatcat:jddvs65yd5bt7e2unfn55ftmza

A General Privacy-Preserving Auction Mechanism for Secondary Spectrum Markets

Qianyi Huang, Yang Gui, Fan Wu, Guihai Chen, Qian Zhang
2016 IEEE/ACM Transactions on Networking  
In this paper, we present PISA, which is a PrIvacy preserving and Strategy-proof Auction mechanism for spectrum allocation.  ...  However, the issue of privacy preservation in spectrum auctions remains open. On the one hand, truthful bidding reveals bidders' private valuations of the spectrum.  ...  In Section IV, we enhance PISA to provide stronger privacy protection (i.e., coverage/interference area privacy and k-anonymous bid privacy for all bidders).  ... 
doi:10.1109/tnet.2015.2434217 fatcat:csqpcbisbzabhj2q2xtlys4o7i
« Previous Showing results 1 — 15 out of 261 results