Privacy-preserving combinatorial auction without an auctioneer

[1]  Jiguo Yu,et al.  A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds , 2018, IEEE Transactions on Big Data.

[2]  Jiguo Yu,et al.  SecureGuard: A Certificate Validation System in Public Key Infrastructure , 2018, IEEE Transactions on Vehicular Technology.

[3]  Jiguo Yu,et al.  Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing , 2017, IEEE Transactions on Industrial Informatics.

[4]  Chunqiang Hu,et al.  Secure multi-unit sealed first-price auction mechanisms , 2016, Secur. Commun. Networks.

[5]  Chunqiang Hu,et al.  A Bidder-Oriented Privacy-Preserving VCG Auction Scheme , 2015, WASA.

[6]  Chunqiang Hu,et al.  A Secure Multi-unit Sealed First-Price Auction Mechanism , 2015, WASA.

[7]  Chunqiang Hu,et al.  Secure Auctions without an Auctioneer via Verifiable Secret Sharing , 2015, PAMCO@MobiHoc.

[8]  Jing Liu,et al.  Achieving Accountability in Smart Grid , 2014, IEEE Systems Journal.

[9]  Douglas R. Stinson,et al.  Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing , 2014, ISPEC.

[10]  Xiaofeng Liao,et al.  Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.

[11]  Fan Wu,et al.  SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.

[12]  Xiaofeng Liao,et al.  Verifiable multi-secret sharing based on LFSR sequences , 2012, Theor. Comput. Sci..

[13]  Xiaofeng Liao,et al.  Secret Image Sharing Based on Chaotic Map and Chinese Remainder Theorem , 2012, Int. J. Wavelets Multiresolution Inf. Process..

[14]  M. Pan,et al.  Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer , 2012, Wirel. Networks.

[15]  Joan Feigenbaum,et al.  Towards a formal model of accountability , 2011, NSPW '11.

[16]  Miao Pan,et al.  Purging the Back-Room Dealing: Secure Spectrum Auction Leveraging Paillier Cryptosystem , 2011, IEEE Journal on Selected Areas in Communications.

[17]  Ralf Küsters,et al.  Accountability: definition and relationship to verifiability , 2010, CCS '10.

[18]  G. A. Sutherland,et al.  A System of Diet and Dietetics , 2010 .

[19]  Radha Jagadeesan,et al.  Towards a Theory of Accountability and Audit , 2009, ESORICS.

[20]  Massoud Hadian Dehkordi,et al.  An efficient threshold verifiable multi-secret sharing , 2008, Comput. Stand. Interfaces.

[21]  Makoto Yokoo,et al.  Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.

[22]  Hiroaki Kikuchi,et al.  (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.

[23]  Kunio Kobayashi,et al.  Efficient Sealed-Bid Auction Using Hash Chain , 2000, ICISC.

[24]  Christian Cachin,et al.  Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.

[25]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[26]  Biswanath Mukherjee,et al.  Analysis of an algorithm for distributed recognition and accountability , 1993, CCS '93.

[27]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[28]  R Bellman,et al.  DYNAMIC PROGRAMMING AND LAGRANGE MULTIPLIERS. , 1956, Proceedings of the National Academy of Sciences of the United States of America.

[29]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[30]  Koutarou Suzuki,et al.  Efficient Sealed-Bid Auction by Using One-Way Functions , 2001 .