TY - JOUR
T1 - How to obtain full privacy in auctions
AU - Brandt, Felix
PY - 2006/10
Y1 - 2006/10
N2 - Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M+1)st-price auction protocols that only yield the winners' identities and the selling price. Moreover, if desired, losing bidders learn no information at all, except that they lost. Our security model is merely based on computational intractability. In particular, our approach does not rely on trusted third parties, e.g., auctioneers. We present an efficient implementation of the proposed techniques based on El Gamal encryption whose security only relies on the intractability of the decisional Diffie-Hellman problem. The resulting protocols require just three rounds of bidder broadcasting in the random oracle model. Communication complexity is linear in the number of possible bids.
AB - Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M+1)st-price auction protocols that only yield the winners' identities and the selling price. Moreover, if desired, losing bidders learn no information at all, except that they lost. Our security model is merely based on computational intractability. In particular, our approach does not rely on trusted third parties, e.g., auctioneers. We present an efficient implementation of the proposed techniques based on El Gamal encryption whose security only relies on the intractability of the decisional Diffie-Hellman problem. The resulting protocols require just three rounds of bidder broadcasting in the random oracle model. Communication complexity is linear in the number of possible bids.
KW - Auctions
KW - Cryptographic protocols
KW - Homomorphic encryption
UR - http://www.scopus.com/inward/record.url?scp=33749009024&partnerID=8YFLogxK
U2 - 10.1007/s10207-006-0001-y
DO - 10.1007/s10207-006-0001-y
M3 - Article
AN - SCOPUS:33749009024
SN - 1615-5262
VL - 5
SP - 201
EP - 216
JO - International Journal of Information Security
JF - International Journal of Information Security
IS - 4
ER -