Brandt's fully private auction protocol revisited

Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Luca Spalazzi, Luca Viganò
2015 Journal of Computer Security  
Auctions have a long history, having been recorded as early as 500 B.C. [Kri02] . Nowadays, electronic auctions have been a great success and are increasingly used in various applications, including high performance computing [BAGS02]. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt [Bra06] developed a protocol that computes the winner using homomorphic operations on a
more » ... tions on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol -when using malleable interactive zero-knowledge proofs -is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants' bids. We provide an efficient parallelized implementation of the protocol and the attack to show its practicality. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems.
doi:10.3233/jcs-150535 fatcat:cixbaluejjftxnh57yrel2m67i