Brandt's Fully Private Auction Protocol Revisited

نویسندگان

  • Jannik Dreier
  • Jean-Guillaume Dumas
  • Pascal Lafourcade
چکیده

Auctions have a long history, having been recorded as early as 500 B.C. [17]. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt [4] developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol – when using malleable interactive zero-knowledge proofs – is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants’ bids. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure and Private Auctions without Auctioneers

Security and privacy have become crucial factors in auction design. Various schemes to ensure the safe conduction of sealed-bid auctions have been proposed recently. We introduce a new standard of security for auctions (“full privacy”), that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than other common assumptions that prohibit the ...

متن کامل

Fully Private Auctions in a Constant Number of Rounds

We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than common assumptions in existing protocols that prohibit the collusion of certain third-parties (e.g. distinct auctioneers). Full privacy is obtained by using homomorphic ElGamal encryption and a private key that is distributed among ...

متن کامل

A verifiable, bidder-resolved Auction Protocol

Security and privacy have become crucial factors in auction design. Various schemes to ensure the safe conduction of sealed-bid auctions have been proposed recently. We introduce a new standard of privacy for auctions (“full privacy”), that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than other common assumptions that prohibit the c...

متن کامل

A Novel Approach to Fully Private and Secure Auction: A Sealed Bid Knapsack Auction

In an electronic auction protocol, the main participants are the seller, a set of trusted auctioneer(s) and the set of bidders. In this paper we consider the situation where there is a seller and a set of n bidders intending to come to an agreement on the selling price of a certain good. Full private or bidder-resolved auction means that this agreement is reached without the help of trusted par...

متن کامل

Hybrid Auctions Revisited

We examine hybrid auctions with affiliated private values and risk-averse bidders, and show that the optimal hybrid auction trades off the benefit of information extraction in the ascendingbid phase and the cost of reduced competition in the sealed-bid phase.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013