Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer

نویسندگان

  • Miao Pan
  • Xiaoyan Zhu
  • Yuguang Fang
چکیده

Spectrum auction is an enabling technology for improving the spectrum efficiency of unused licensed bands (white spaces) in wireless networks. However, the back-room dealing (i.e., the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) poses serious security challenges, leading to failures of all existing secure auction designs in allocating spectrum bands. In this paper, we propose a secure combinatorial spectrum auction (SCSA) by utilizing homomorphic encryption to prevent the backroom dealing. The idea in SCSA is to incorporate cryptographic techniques into the spectrum auction to address the frauds and bid-rigging. It computes and reveals the results of spectrum auction while the actual bidding values of bidders are kept confidential. SCSA also provides a corresponding procedure in implementing the combinatorial spectrum auction under the interference constraints. We show that compared with existing secure spectrum auction designs against the untrustworthy auctioneer, SCSA is much more efficient in both communication and computational complexity; and compared with other spectrum auction designs with security consideration, SCSA can effectively thwart the back-room dealings due to the untrustworthy auctioneer without too much performance degradation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Leveraging Homomorphic Encryption to Secure the Combinatorial Spectrum Auction without the Trustworthy Auctioneer

Spectrum auction is an enabling approach for drastically improving the spectrum utilization to satisfy the ever increasing service demands in wireless networks. However, the back-room dealing (i.e., the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) makes these applications confront significant security challenges, and fails a...

متن کامل

M+1-st Price Auction without Auctioneers Based on Threshold ElGamal Encryption

With the development of all types of electronic auction, the study of designing secure electronic auction has become an important issue. This paper deals with (M+1)-st price auction. We present a secure protocol without auctioneer, taking advantage of the homomorphic lemma of threshold ElGamal encryption. The bidders can compute the result by themselves without leaking own messages. The correct...

متن کامل

Cryptographic Combinatorial Clock-Proxy Auctions

We present a cryptographic protocol for conducting efficient, provably-correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trusted auction despite price discovery: bidders submit encrypted bids, and prove for themselves that they meet activity rules, and can compute total demand and thus verify price increases without revealing any information abo...

متن کامل

Efficient Privacy-Preserving Protocols for Multi-unit Auctions

The purpose of multi-unit auctions is to allocate identical units of a single type of good to multiple agents. Besides well-known applications like the selling of treasury bills, electrical power, or spectrum licenses, multi-unit auctions are also well-suited for allocating CPU time slots or network bandwidth in computational multiagent systems. A crucial problem in sealed-bid auctions is the l...

متن کامل

Secure Generalized Vickrey Auction without Third-party Servers

This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Combinatorial auctions, in which multiple goods are sold simultaneously, have recently attracted considerable attention. The GVA can handle combinatorial auctions and has good theoretical characteristics such as incentiv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Wireless Networks

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2012