Anonymous sealed bid auction protocol based on a variant of the dining cryptographers' protocol

نویسندگان

  • Mihály Bárász
  • Péter Ligeti
  • László Mérai
  • Daniel A. Nagy
چکیده

Sealed bid auctions are a popular means of high-stakes bidding, as they eliminate the temporal element from the auction process, allowing participants to take less emotional, more thoughtful decisions. In this paper, we propose a digital communication protocol for conducting sealed bid auctions with high stakes, where the anonymity of bids as well as other aspects of fairness must be protected. The Dining Cryptographers’ Protocol (denoted by DC) was presented by David Chaum in 1988. The protocol allows the participants to broadcast a message anonymously. In a recent paper (Another Twist in the Dining Cryptographers’ Protocol, submitted to Journal of Cryptology) the authors propose a variant of the original DC eliminating its main disadvantages. In this paper we present a cryptographic protocol realizing anonymous sealed bid auctions, such as first price or Vickrey auction, based on this variant. The proposed scheme allows to identify at least one dishonest participants violating the protocol without the using of Trusted Third Parties. Additionally, we require that bids are binding. It is achieved by enabling all participants acting in concert (the so-called “angry mob”) to find out the identity of the winner, in case the winner fails to make the purchase. ∗This research was partially supported by the Momentum (Lendület) fund of the Hungarian Academy of Sciences and the European Union and the European Social Fund have provided financial support to the project under the grant agreement no. TÁMOP 4.2.1/B09/1/KMR-2010-0003.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Anonymous Sealed-bid Electronic Auction Based on Ring Signature

Privacy and anonymity have become two factors of increasing importance in auction protocol. This paper provides an efficient sealed-bid electronic auction protocol based on the technique of ring signature and verifiable technique of encryption key chain. The peculiar characteristics of our protocol are non-repudiation of bidders but preserving their anonymity and allowing the auctioneer to dete...

متن کامل

Dining Cryptographers with 0.924 Verifiable Collision Resolution

The dining cryptographers protocol implements a multiple access channel in which senders and recipients are anonymous. A problem is that a malicious participant can disrupt communication by deliberately creating collisions. We propose a computationally secure dining cryptographers protocol with collision resolution that achieves a maximum stable throughput of 0.924 messages per round and which ...

متن کامل

Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast

Knowledge-based programs provide an abstract level of description of protocols in which agent actions are related to their states of knowledge. The paper describes how epistemic model checking technology may be applied to discover and verify concrete implementations based on this abstract level of description. The details of the implementations depend on the specific context of use of the proto...

متن کامل

GHZ correlation provides secure Anonymous Veto Protocol

Anonymous Veto (AV) and Dining cryptographers (DC) are two basic primitives for the cryptographic problems that can hide the identity of the sender(s) of classical information. They can be achieved by classical methods and the security is based on computational hardness or requires pairwise shared private keys. In this regard, we present a secure quantum protocol for both DC and AV problems by ...

متن کامل

An Anonymous Sealed-bid Auction with a Feature of Entertainment

Some works about an electronic sealed-bid auction protocol have been proposed1),3),5)∼10),15),16),18). An electronic auction scheme should satisfy the following seven properties: (a)Fair of bidders; (b)Bid security; (c)Anonymity; (d)Validity of winning bids; (e)Non-repudiation; (f)Robustness; and (g)Efficient bidding points. Many previous schemes do not realize anonymity for an auction manager....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Periodica Mathematica Hungarica

دوره 65  شماره 

صفحات  -

تاریخ انتشار 2012