Five sealed-bid auction models

  • Authors:
  • Kun Peng;Colin Boyd;Ed Dawson;Kapali Viswanathan

  • Affiliations:
  • Information Security Research Centre, Faculty of Information Technology, Queensland University of Technology, 2, George Street, Brisbane, QLD4001, Australia;Information Security Research Centre, Faculty of Information Technology, Queensland University of Technology, 2, George Street, Brisbane, QLD4001, Australia;Information Security Research Centre, Faculty of Information Technology, Queensland University of Technology, 2, George Street, Brisbane, QLD4001, Australia;Information Security Research Centre, Faculty of Information Technology, Queensland University of Technology, 2, George Street, Brisbane, QLD4001, Australia

  • Venue:
  • ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Published sealed-bid auction schemes are classified into four models according to how they deal with bid privacy. The properties of each model are introduced and possible improvements in these models are suggested. A new model is proposed and its implementation is discussed. Application of different models is discussed, based on a comparison of the models.