A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment
[chapter]
2014
Lecture Notes in Computer Science
Moreover the bandwidth required to communicate the receipt-free bids is huge. This paper presents a sealed-bid auction mechanism to resist bid-rigging. ...
Sealed-Bid auction is an efficient and rational method to establish the price in open market. However sealed-bid auctions are subject to bid-rigging attack. ...
Receipt-free Sealed-Bid Auction The receipt-freeness is proposed to prevent bid-rigging in sealed-bid auction. ...
doi:10.1007/978-3-319-12160-4_25
fatcat:stqhgxepo5ffvh4dy4ruvqxr4e
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption
[chapter]
2004
Lecture Notes in Computer Science
We argue that it is more important to provide receipt-freeness for winners and propose a new receipt-free sealed bid auction scheme using the homomorphic encryption technique. ...
Bid-rigging is a dangerous attack in electronic auction. Abe and Suzuki firstly introduced the idea of receipt-free to prevent this attack. ...
Receipt-Free Sealed Bid Auctions In this section, we present receipt-free sealed bid auctions. ...
doi:10.1007/978-3-540-24691-6_20
fatcat:bvhdzxruujew5kb2ey5cvby2va
Formal modelling and analysis of receipt-free auction protocols in applied pi
2017
Computers & security
We formally study two privacy-type properties for e-auction protocols: bidding-pricesecrecy and receipt-freeness. ...
We analyse two receipt-free auction protocols: one proposed by Abe and Suzuki in 2002 (AS02) and the other by Howlader et al. in 2014 (HRM14). ...
Receipt-freeness: A sealed-bid e-auction protocol is receipt-free for non-winning bidders if a non-winning bidder cannot prove how he bids to the adversary. ...
doi:10.1016/j.cose.2016.09.002
fatcat:pegmcayafrhljnlfeflqe6arme
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus
[chapter]
2011
Lecture Notes in Computer Science
We analyse the receipt-free auction protocol by Abe and Suzuki. Bidding-price-secrecy of the protocol is verified using ProVerif, whereas receipt-freeness of the protocol is proved manually. ...
We formally study two privacy-type properties for online auction protocols: bidding-price-secrecy and receipt-freeness. ...
AS02 sealed-bid online auction protocol Sealed-bid auctions are a type of auction in which bidders submit their bids without knowing what other bidders bid. ...
doi:10.1007/978-3-642-19751-2_15
fatcat:rh5asfxnife2bcd3lbmzmcbyvi
Quantum and semi-quantum sealed-bid auction: Vulnerabilities and advantages
[article]
2021
arXiv
pre-print
Further, realizing the role of secure sealed-bid auction in the reduction of corruption, a new protocol for sealed-bid auction is proposed which is semi-quantum in nature, where the bidders do not have ...
A family of existing protocols for quantum sealed-bid auction is critically analyzed, and it is shown that they are vulnerable under several attacks (e.g., the participant's and non-participant's attacks ...
These facts motivated us to propose a semi-quantum protocol of sealed-bid auction free from the vulnerabilities present in protocols of Liu et al. and Zhang et al. ...
arXiv:2108.06388v1
fatcat:6tw7katkcfcjresme4344sctru
Formal Verification of e-Auction Protocols
[chapter]
2013
Lecture Notes in Computer Science
We have to show that for any auction process AP and any bids Assume that for any auction process AP and any bids Then we can proceed as follows. ...
We model protocols in the Applied Pi-Calculus and define privacy notions, which include secrecy of bids, anonymity of the participants, receipt-freeness and coercion-resistance. ...
[13] analyzed a receipt-free auction protocol in the Applied π-Calculus. They only considered privacy, in particular secrecy of the bidding price and receipt-freeness, but only for losing bidders. ...
doi:10.1007/978-3-642-36830-1_13
fatcat:364qqwriy5blzkgokjeicsv7bm
Fair On-Line Auctions without Special Trusted Parties
[chapter]
1999
Lecture Notes in Computer Science
These attacks include selectively blocking bids based on the bidder and amount and selectively closing the auction after a particular bid is received. ...
Traditional face-to-face English auctions rely on the auctioneer to fairly interact with bidders to accept the highest bid on behalf of the seller. On-line auctions also require fair negotiation. ...
Because we are concerned with open-bid auctions, we will not consider subtleties of sealed-bid auctions. ...
doi:10.1007/3-540-48390-x_17
fatcat:rpsajoiqffhpxhwsokv4m4olqm
Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement
2017
Quantum Information Processing
A feasible, secure and collusion-attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multi-party circular quantum key agreement. ...
It is shown that the proposed protocol is free from the collusion attacks that are possible on the existing schemes of quantum sealed-bid auction. ...
This fact and the importance of the sealed-bid auction schemes in the modern economy motivated us to design a new protocol for sealed-bid auction that is free from the limitations of the previously proposed ...
doi:10.1007/s11128-017-1620-0
fatcat:tn22onr4unclzagrfek7ux7de4
Experiments on Auction Valuation and Endogenous Entry
2004
Social Science Research Network
At the end of the session participants filled out receipts with their earnings, were paid their earnings in private and in cash, and left. A. ...
Subjects were specifically told that the numbers in the examples have been chosen with the sole purpose of illustrating the rules of the game and are not to be taken as bidding advice. ...
sealed bid auction. ...
doi:10.2139/ssrn.673528
fatcat:ndug2bp3tvdkbfy4f6dfa4n4qm
A Blockchain-Based Sealed-Bid e-Auction Scheme with Smart Contract and Zero-Knowledge Proof
2021
Security and Communication Networks
According to the transaction process and basic principles of the sealed auction, we explored the problems existing in the current sealed-bid e-auction schemes. ...
e-Auction improves the efficiency of bid transaction. ...
Goods, reserve price, and t1 and t2 Auction information Acceptance Receipt Figure 2 : e process of the decentralized sealed-bid e-auction.
Comparison Analysis with Related Blockchain-Based Works. ...
doi:10.1155/2021/5523394
fatcat:6jqdbrszwfbs7haoyqskjqwipq
Carbon Allowance Auction Design: An Assessment of Options for the U.S
2010
Social Science Research Network
We discuss and evaluate the two leading candidates for the auction format for carbon allowance auctions: a uniform-price sealed-bid auction and an ascending-bid dynamic auction, either of which could be ...
We conclude that a uniform-price sealed-bid auction is more appropriate for the sale of carbon allowances than the other leading choices, in part because it offers increased robustness to collusion without ...
pay-as-bid sealed-bid auction. ...
doi:10.2139/ssrn.1677606
fatcat:2rhicb7odvbaxoaqzzbkppvcea
Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption
2011
International journal of network security and its applications
In the prior literatures of e-voting and e-auctioning, threshold-encryption and receipt-free mechanism are used to prevent the coercion and collusion respectively. ...
Adversary used to acquire the encrypted votes/bids either from the colluded authorities (voting server, auctioneer) or by eavesdropping the communicating channel and coerces the candidates to disclose ...
Similar protection is there for sealed-bid auction, where the bids are submitted in the sealed envelope and no receipts are issued. ...
doi:10.5121/ijnsa.2011.3208
fatcat:polcoy5fq5gbbbzlmzye7xes4i
Envy-free auctions for digital goods
2003
Proceedings of the 4th ACM conference on Electronic commerce - EC '03
strategy is to bid the maximum value they are willing to pay. • Envy-free: after the auction is run, no bidder would be happier with the outcome of another bidder (for unlimited supply auctions, this ...
Our main result is to show that no constant-competitive truthful auction is envy-free. ...
Acknowledgments We are grateful to Amos Fiat for suggesting that we consider envy-free outcomes and for his contributions to the initial discussions on the topic; to Joan Feigenbaum for pointing us to ...
doi:10.1145/779928.779932
dblp:conf/sigecom/GoldbergH03
fatcat:blgbaxfvzzbm3iveq5btfzrg2i
Exploiting Caching, Proxy Re-encryption, Incentives, and Wi–Fi Direct for Authorized Content Distribution
2016
Procedia Computer Science
The proposed mechanism is based on auction theory and uses reverse first sealed-bid auctions. ...
We used a reverse first sealed-bid auction in order to find which candidate will take the role of the relay. ...
doi:10.1016/j.procs.2016.09.014
fatcat:bjsyxxmm3fdmjm62l5teqxeroa
Auction-Based Agent Negotiation in Cognitive Radio Ad Hoc Networks
[chapter]
2013
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
In this paper, we use a technique based on auctions theory known for its simplicity and facilitates the allocation of scarce resources. ...
Auctions
Single
round
Multiple
rounds
First-price
sealed-bid
auctions
Second-price
sealed-bid
auctions
(Vickrey)
English
Dutch
Table 3 . 3 Difference between classical auctions and ...
For First-Price Sealed-Bid Auctions The initiator starts the auction and each participant submits a bid in an envelope or electronically in a single round (turn), without knowing the bids of the others ...
doi:10.1007/978-3-642-36958-2_9
fatcat:b2lsukaxenhr5lqp5owdlsu5am
« Previous
Showing results 1 — 15 out of 1,963 results