Distributing trust with the Rampart toolkit
Communications of the ACM
Cryptographic support for fault-tolerant distributed computing
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
Online Auction Protocols: A Comparative Study
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
An Internet Anonymous Auction Scheme
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
On cheating in sealed-bid auctions
Proceedings of the 4th ACM conference on Electronic commerce
Security model for a multi-agent marketplace
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
On cheating in sealed-bid auctions
Decision Support Systems - Special issue: The fourth ACM conference on electronic commerce
Markets vs auctions: Approaches to distributed combinatorial resource scheduling
Multiagent and Grid Systems - Smart Grid Technologies & Market Models
Unified support for heterogeneous security policies in distributed systems
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
On cheating in sealed-bid auctions
Decision Support Systems - Special issue: The fourth ACM conference on electronic commerce
Homomorphisms of secret sharing schemes: a tool for verifiable signature sharing
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Cheat-proof serverless network games
CG'06 Proceedings of the 5th international conference on Computers and games
Limitations on design principles for public key protocols
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
The role of secret sharing in the distributed MARE protocols
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A practical implementation of secure auctions based on multiparty integer computation
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Timed release cryptography from bilinear pairings using hash chains
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Formal verification of e-auction protocols
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Development and evaluation of a secure, privacy preserving combinatorial auction
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
Verifiable auctions for online ad exchanges
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Incorporating Privacy into the Undergraduate Curriculum
Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference
Hi-index | 0.02 |
Abstract: We present the design and implementation of a distributed service for performing sealed-bid auctions. This service provides an interface by which clients, or "bidders", can issue secret bids to the service for an advertised auction. Once the bidding period has ended, the auction service opens the bids, determines the winning bid, and provides the winning bidder with a ticket for claiming the item bid upon. Using novel cryptographic techniques, the service is constructed to provide strong protection for both the auction house and correct bidders, despite the malicious behavior of any number of bidders and even a constant fraction of the servers comprising the auction service. Specifically, it is guaranteed that (i) bids of correct bidders are not revealed until after the bidding period has ended, (ii) the auction house collects payment for the winning bid, (iii) losing bidders forfeit no money, and (iv) only the winning bidder can collect the item bid upon. We also discuss techniques to enable anonymous bidding.