STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Completeness theorems for non-cryptographic fault-tolerant distributed computation
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Multiparty unconditionally secure protocols
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
The Design and Implementation of a Secure Auction Service
IEEE Transactions on Software Engineering
Internet economics
Internet cost allocation and pricing
Internet economics
Communications of the ACM
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Efficient private bidding and auctions with an oblivious third party
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Privacy preserving auctions and mechanism design
Proceedings of the 1st ACM conference on Electronic commerce
Online Auction Protocols: A Comparative Study
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
An Equitably Fair On-line Auction Scheme
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Efficient Sealed-Bid Auction Using Hash Chain
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Mix and Match: Secure Function Evaluation via Ciphertexts
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Non-interactive Private Auctions
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
(M+1)st-Price Auction Protocol
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Fair On-Line Auctions without Special Trusted Parties
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Private Selective Payment Protocols
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Cryptographic Protocols for Secure Second-Price Auctions
CIA '01 Proceedings of the 5th International Workshop on Cooperative Information Agents V
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees
ISW '00 Proceedings of the Third International Workshop on Information Security
Receipt-Free Sealed-Bid Auction
ISC '02 Proceedings of the 5th International Conference on Information Security
M+1-st Price Auction Using Homomorphic Encryption
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
On cheating in sealed-bid auctions
Proceedings of the 4th ACM conference on Electronic commerce
On the Provision of Replicated Internet Auction Services
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Internet based auctions: a survey on models and applications
ACM SIGecom Exchanges
How to conduct a sealed bargain on the internet
InfoSecu '04 Proceedings of the 3rd international conference on Information security
The privacy cost of the second-chance offer
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Improving resource utilisation in market oriented grid management and scheduling
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
On the Existence of Unconditionally Privacy-Preserving Auction Protocols
ACM Transactions on Information and System Security (TISSEC)
Designing a secure e-tender submission protocol
Electronic Commerce Research
Practical secrecy-preserving, verifiably correct and trustworthy auctions
Electronic Commerce Research and Applications
A secure e-auction scheme based on group signatures
Information Systems Frontiers
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
A new reverse auction agent system for m-commerce using mobile agents
Computer Standards & Interfaces
A new secure and efficient M+1st price auction scheme based on ECC system
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Secure combinatorial auctions by dynamic programming with polynomial secret sharing
FC'02 Proceedings of the 6th international conference on Financial cryptography
A two-server, sealed-bid auction protocol
FC'02 Proceedings of the 6th international conference on Financial cryptography
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
On server trust in private proxy auctions
Electronic Commerce Research
Unconditionally secure first-price auction protocols using a multicomponent commitment scheme
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Analysis of a receipt-free auction protocol in the applied pi calculus
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
UAI'01 Proceedings of the Seventeenth conference on Uncertainty in artificial intelligence
Service allocation in selfish mobile ad hoc networks using vickrey auction
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Timed release cryptography from bilinear pairings using hash chains
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Secure multi-attribute procurement auction
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Formal verification of e-auction protocols
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Development and evaluation of a secure, privacy preserving combinatorial auction
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
Defining verifiability in e-auction protocols
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Verifiable auctions for online ad exchanges
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Hi-index | 0.00 |
Auctions are a fundamental electronic commerce technology. We describe a set of protocols for performing sealed-bid electronic auctions which preserve the privacy of the submitted bids using a form of secure distributed computation. Bids are never revealed to any party, even after the auction is completed. Both first-price and second-price (Vickrey) auctions are supported, and the computational costs of the methods are low enough to allow their use in many real-world auction situations.