Privacy-preserving combinatorial auction without an auctioneer
نویسندگان
چکیده
Combinatorial auctions are employed into many applications such as spectrum auctions held by the Federal Communications Commission (FCC). A crucial problem in such auctions is the lack of secure and efficiency mechanism to protect the privacy of the bidding prices and to ensure data security. To solve the problem, we propose an approach to represent the price as a polynomial’s degree based on verifiable secret sharing. So, we can obtain the two polynomials’s degree maximum/sum by the degree of the two polynomial’s degree sum/product. In the protocol, the bidders’ information is hidden. The auctioneers can receive the shares without a secure channel, so our protocol is more applicable to more scenarios. The scheme can resist the collusion attack, passive attack and so on. Moreover, Compared to Kikuchi (IEICE Trans Fundam Electron Commun Comput Sci 85(3):676–683, 2002); Suzuki and Yokoo (Secure combinatorial auctions by dynamic programming with polynomial secret sharing, 2003), the proposed scheme has the authentication property without increasing the communications cost.
منابع مشابه
Privacy Preserving Auction Based Virtual Machine Instances Allocation Scheme for Cloud Computing Environment
Received Jul 23, 2016 Revised Jun 7, 2017 Accepted Sep 11, 2017 Cloud Computing Environment provides computing resources in the form of Virtual Machines (VMs), to the cloud users through Internet. Auction-based VM instances allocation allows different cloud users to participate in an auction for a bundle of Virtual Machine instances where the user with the highest bid value will be selected as ...
متن کاملQuantum Auctions using Adiabatic Evolution: The Corrupt Auctioneer and Circuit Implementations
We examine a proposed auction algorithm using quantum states to represent bids and distributed adiabatic search to find the winner 1. When the auctioneer follows the protocol, the final measurement giving the outcome of the auction also destroys the bid states, thereby preserving privacy of losing bidders. We describe how a dishonest auctioneer could alter the protocol to violate this privacy g...
متن کاملPrivacy-Preserving Strategyproof Auction Mechanisms for Resource Allocation in Wireless Communications
In recent years, auction theory has been extensively studied and many state-of-art solutions have been proposed aiming at allocating scarce resources (e.g. spectrum resources in wireless communications). Unfortunately, most of these studies assume that the auctioneer is always trustworthy in the sealedbid auctions, which is not always true in a more realistic scenario. On the other hand, perfor...
متن کاملUsing homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer
Spectrum auction is an enabling technology for improving the spectrum efficiency of unused licensed bands (white spaces) in wireless networks. However, the back-room dealing (i.e., the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) poses serious security challenges, leading to failures of all existing secure auction designs in...
متن کاملDecentralized Multi-Project Scheduling via Multi-Unit Combinatorial Auction
In industry, many problems are considered as the Decentralized Resource-Constrained Multi-Project Scheduling Problem (DRCMPSP). Existing approaches encounter difficulties in dealing with large problems while preserving information privacy of project agents. In this paper, we propose a novel approach to solve DRCMPSP based on the multi-unit combinatorial auction, which can efficiently solve the ...
متن کامل