STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Completeness theorems for non-cryptographic fault-tolerant distributed computation
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
The Design and Implementation of a Secure Auction Service
IEEE Transactions on Software Engineering
Computationally Manageable Combinational Auctions
Management Science
Privacy preserving auctions and mechanism design
Proceedings of the 1st ACM conference on Electronic commerce
An efficient approximate algorithm for winner determination in combinatorial auctions
Proceedings of the 2nd ACM conference on Electronic commerce
Communications of the ACM
Robust combinatorial auction protocol against false-name bids.
Artificial Intelligence
Taming the Computational Complexity of Combinatorial Auctions: Optimal and Approximate Approaches
IJCAI '99 Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence
An Algorithm for Optimal Winner Determination in Combinatorial Auctions
IJCAI '99 Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence
Sealed Bid Mulit-object Auctions with Necessary Bundles and Its Application to Spectrum Auctions
PRIMA 2001 Proceedings of the 4th Pacific Rim International Workshop on Multi-Agents, Intelligent Agents: Specification, Modeling, and Applications
Some Tractable Combinatorial Auctions
Proceedings of the Seventeenth National Conference on Artificial Intelligence and Twelfth Conference on Innovative Applications of Artificial Intelligence
(M+1)st-Price Auction Protocol
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Dynamic Programming
Economic mechanism design for computerized agents
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
CABOB: a fast optimal algorithm for combinatorial auctions
IJCAI'01 Proceedings of the 17th international joint conference on Artificial intelligence - Volume 2
Publicly verifiable secret sharing
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Secure combinatorial auctions by dynamic programming with polynomial secret sharing
FC'02 Proceedings of the 6th international conference on Financial cryptography
Secure Distributed Constraint Satisfaction: Reaching Agreement without Revealing Private Information
CP '02 Proceedings of the 8th International Conference on Principles and Practice of Constraint Programming
Receipt-Free Sealed-Bid Auction
ISC '02 Proceedings of the 5th International Conference on Information Security
Protocol/Mechanism Design for Cooperation/Competition
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
(Im)Possibility of Unconditionally Privacy-Preserving Auctions
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2
Publicly Verifiable Auctions with Minimal Leakage
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
How to conduct a sealed bargain on the internet
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Smooth traffic flow with a cooperative car navigation system
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Secure distributed constraint satisfaction: reaching agreement without revealing private information
Artificial Intelligence - Special issue: Distributed constraint satisfaction
Practical secrecy-preserving, verifiably correct and trustworthy auctions
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Improving resource utilisation in market oriented grid management and scheduling
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Private Information: To Reveal or not to Reveal
ACM Transactions on Information and System Security (TISSEC)
Practical secrecy-preserving, verifiably correct and trustworthy auctions
Electronic Commerce Research and Applications
Secure distributed constraint satisfaction: reaching agreement without revealing private information
Artificial Intelligence - Special issue: Distributed constraint satisfaction
Longest common subsequence as private search
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Secure combinatorial auctions by dynamic programming with polynomial secret sharing
FC'02 Proceedings of the 6th international conference on Financial cryptography
Cryptographic securities exchanges
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
A privacy-preserving protocol for finding the nearest doctor in an emergency
Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
Discrete logarithm based additively homomorphic encryption and secure data aggregation
Information Sciences: an International Journal
Hybrid approach for secure mobile agent computations
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Discrete-Log-Based additively homomorphic encryption and secure WSN data aggregation
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Secure multi-attribute procurement auction
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Development and evaluation of a secure, privacy preserving combinatorial auction
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
Protecting privacy through distributed computation in multi-agent decision making
Journal of Artificial Intelligence Research
An efficient privacy-preserving solution for finding the nearest doctor
Personal and Ubiquitous Computing
Hi-index | 0.00 |
This paper presents a secure dynamic programming protocol that utilizes homomorphic encryption. By using this method, multiple agents can solve a combinatorial optimization problem among them without leaking their private information. More specifically, in this method, multiple servers cooperatively perform dynamic programming procedures for solving a combinatorial optimization problem by using the private information sent from agents as inputs. Although the severs can compute the optimal solution correctly, the inputs are kept secret even from the servers.Such a secure protocol is important when a fully trusted agent is not available, e.g., an auctioneer cannot be fully trusted in a combinatorial auction. By utilizing the proposed protocol, multiple auction servers can solve the winner determination problem, while the information of bids that are not part of the optimal solution is kept secret even from the auction servers. We discuss the application of this protocol to various types of combinatorial auctions, i.e., multi-unit auctions, linear-good auctions, and general combinatorial auctions.