منابع مشابه
Five Sealed-bid Auction Models
Published sealed-bid auction schemes are classi ed into four models according to how they deal with bid privacy. The properties of each model are introduced and possible improvements in these models are suggested. A new model is proposed and its implementation is discussed. Application of di erent models is discussed, based on a comparison of the models.
متن کاملA Sealed-Bid Auction That Matches the English Auction
∗ Financial support was received from the Center for Rationality, Hebrew University in Jerusalem, the Deutsche Forschungsgemeinschaft, SFB 373 (“Quantifikation und Simulation Ökonomischer Prozesse”), Humboldt-Universität zu Berlin, the Koret Foundation, and the EUTMR Research Network ENDEAR (FMRX-CT98-0238). We are grateful to Filippo Caffarelli for bringing to our attention the ENI auction pro...
متن کاملA Market-Affected Sealed-Bid Auction Protocol
Multiagent resource allocation defines the issue of having to distribute a set of resources among a set of agents, aiming at a fair and efficient allocation. Resource allocation procedures can be evaluated with regard to properties such as budget balance and strategy-proofness. Designing a budget-balanced and strategy-proof allocation procedure that always provides a fair (namely, envyfree) and...
متن کاملA Two-Server, Sealed-Bid Auction Protocol
Naor, Pinkas, and Sumner introduced and implemented a sealed-bid, two-server auction system that is perhaps the most efficient and practical to date. Based on a cryptographic primitive known as oblivious transfer, their system aims to ensure privacy and correctness provided that at least one auction server behaves honestly. As observed in [19], however, the NPS system suffers from a security fl...
متن کاملSealed-bid Auction Schemes using Threshold Cryptosystem
This paper proposes a secure sealed-bid auction schemes which adopt threshold cryptosystem without a third party. In the previous proposed sealed-bid auction schemes, an auctioneer is responsible for opening bids. However, malicious auctioneers can conspire with malicious bidders by revealing all bidding prices before the bid opening stage for bidding optimal bidding price to win the auction. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2008
ISSN: 1556-5068
DOI: 10.2139/ssrn.1134767