Strain: A Secure Auction for Blockchains

نویسندگان

  • Erik-Oliver Blass
  • Florian Kerschbaum
چکیده

We present Strain, a new auction protocol running on top of blockchains and guaranteeing bid confidentiality against fully-malicious parties. As our goal is efficiency and low blockchain latency, we abstain from using traditional, highly interactive MPC primitives such as secret shares. Instead for Strain, we design a new maliciouslysecure two-party comparison mechanism executed between any pair of bids in parallel. Using zero-knowledge proofs, Strain broadcasts the outcome of comparisons on the blockchain in a way such that all parties can verify each outcome. The resulting latency is constant in both the number of parties and the bid length, i.e., asymptotically optimal. It is also low in practice, requiring only a total of 4 blocks. Strain also provides typical auction security requirements like non-retractable bids against fully-malicious adversaries. Finally, it protects against adversaries aborting the auction by reversible commitments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Raziel: Private and Verifiable Smart Contracts on Blockchains

Raziel combines secure multi-party computation and proof-carrying code to provide privacy, correctness and verifiability guarantees for smart contracts on blockchains. Effectively solving DAO and Gyges attacks, this paper describes an implementation and presents examples to demonstrate its practical viability (e.g., private and verifiable crowdfundings and investment funds, double auctions for ...

متن کامل

Public versus Private Blockchains

Blockchain-based solutions are one of the major areas of research for institutions, particularly in the financial and the government sectors. There is little disagreement that backbone technologies currently used in these sectors are outdated and need an overhaul to conform to the needs of the times. Distributed or decentralized ledgers in the form of blockchains are one of themost discussed po...

متن کامل

Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer

Spectrum auction is an enabling technology for improving the spectrum efficiency of unused licensed bands (white spaces) in wireless networks. However, the back-room dealing (i.e., the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) poses serious security challenges, leading to failures of all existing secure auction designs in...

متن کامل

Secure Agent

In recent years, online auctions have gone from nothing to an activity measured in hundreds of millions of dollars. Although there is an “auction fever” which tends to take auction as a panacea for shopping and selling, a closer look at its characteristics, however, reveals its hostility towards online retail commerce, e.g., low performance. This paper intends to apply software agent technology...

متن کامل

A Secure Auction Service

In this paper we describe a distributed “English” auction service that remains correct and reliable despite the malicious corruption of some of the bidders and the auctioneer. We describe the properties of such an auction service, the implementation of the auction service, and how the auction service satis¿es the required properties. The auctioneer is replicated for fault tolerance, and all com...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017