A Novel Approach to Fully Private and Secure Auction: A Sealed Bid Knapsack Auction
نویسنده
چکیده
In an electronic auction protocol, the main participants are the seller, a set of trusted auctioneer(s) and the set of bidders. In this paper we consider the situation where there is a seller and a set of n bidders intending to come to an agreement on the selling price of a certain good. Full private or bidder-resolved auction means that this agreement is reached without the help of trusted parties or auctioneers. Therefore, only the seller and the set of bidders are involved, the role of the auctioneers becomes obsolete in this case. We propose a new – simple and secure – technique for the design of a full private sealed-bid auction protocol. We employ the well known mathematical proposition, the knapsack problem which was used by Merkle and Hellman [1] in the design of their asymmetric public-key knapsack trapdoor cryptosystem. Up to our knowledge, the knapsack problem has not been considered before in the design of electronic auctions. We also employ an efficient (1-out-of-k) oblivious transfer of strings for secure data transfer between the seller and the bidders (e.g., [2]). At the end of the protocol, the seller knows the set of prices selected by the bidders, yet he doesn't know which bid belongs to which bidder until the winning bidder announces himself and proves his case by opening a secret code corresponding to the highest price. Our protocol is a 1 st price and automatically a 2 nd price auction as well, since the winning bidder can pay the 2 nd highest price – indicated by a flag – according to the public auction predefined rules. We give the protocol for honest but curious participants then we show how to detect malicious behavior of the participants by employing a one way function with a suitable homomorphic property.
منابع مشابه
Analysis of Digital Knapsack Based Sealed Bid Auction
The need of totally secure online auction has led to the invention of many auction protocols. But as new attacks are developed, auction protocols also require corresponding strengthening. We analyze the auction protocol based on the well-known mathematical public-key knapsack problem for the design of asymmetric public-key knapsack trapdoor cryptosystem. Even though the knapsack system is not c...
متن کاملEfficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing
This article proposes efficient solutions for the construction of sealed-bid second-price and combinatorial auction protocols in an active adversary setting. The main reason for constructing secure auction protocols is that the losing bids can be used in the future auctions as well as negotiations if they are not kept private. Our motivation is to apply verifiable secret sharing in order to con...
متن کاملSealed-Bid Micro Auctions
In electronic auction applications, small-value merchandise is often distributed. We call this kind of auction micro auction. Compared to traditional general-purpose electronic auction, micro electronic auction has its own special requirements. Especially, micro auction must be very efficient: the cost of the auction protocol must not be over the cost of the merchandise for sale. Although the m...
متن کاملOptimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing
Although secret sharing techniques have been applied to implement secure electronic sealed-bid auction for a long time, problems and attacks still exist in secret-sharing-based electronic sealed-bid auction schemes. In this paper, a new secret-sharing-based first-bid e-auction scheme is designed to achieve satisfactory properties and efficiency. Correctness and fairness of the new auction are b...
متن کاملMix and Match: Secure Function Evaluation via Ciphertexts
We introduce a novel approach to general secure multiparty computation that avoids the intensive use of verifiable secret sharing characterizing nearly all previous protocols in the literature. Instead, our scheme involves manipulation of ciphertexts for which the underlying private key is shared by participants in the computation. The benefits of this protocol include a high degree of conceptu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1211.2875 شماره
صفحات -
تاریخ انتشار 2011