Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing

Combinatorial auctions have recently attracted the interests of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a combinatorial auction, multiple items with interdependent values are sold simultaneously and bidders are allowed to bid on any combination of items. This paper presents a method for implementing several secure combinatorial auction protocols based on our newly developed secure dynamic programming protocol. Dynamic programming is a very effective, widely used technique for tackling various combinatorial optimization problems, including several types of combinatorial auctions. Our secure dynamic programming protocol utilizes secret sharing techniques and can obtain the optimal solution of a combinatorial optimization problem, i.e., result of a combinatorial auction, without revealing the inputs of the problem, i.e., bidding prices. We discuss the application of the method to several combinatorial auctions, i.e., multiple-unit single-item auctions, linear-goods auctions, and general combinatorial auctions.

[1]  Sean R Eddy,et al.  What is dynamic programming? , 2004, Nature Biotechnology.

[2]  Yoav Shoham,et al.  Towards a universal test suite for combinatorial auction algorithms , 2000, EC '00.

[3]  J. Doug Tygar,et al.  Electronic Auctions with Private Bids , 1998, USENIX Workshop on Electronic Commerce.

[4]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[5]  Hiroaki Kikuchi,et al.  (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.

[6]  Paul F. Syverson,et al.  Fair On-Line Auctions without Special Trusted Parties , 1999, Financial Cryptography.

[7]  Michael P. Wellman,et al.  The Michigan Internet AuctionBot: a configurable auction server for human and software agents , 1998, AGENTS '98.

[8]  Kouichi Sakurai,et al.  A bulletin-board based digital auction scheme with bidding down strategy-towards anonymous electroni , 1999 .

[9]  David Levine,et al.  CABOB: A Fast Optimal Algorithm for Combinatorial Auctions , 2001, IJCAI.

[10]  松井 知己,et al.  Sealed Bid Multi-object Auctions with Necessary Bundles and its Application to Spectrum Auctions , 2001 .

[11]  Moshe Tennenholtz,et al.  Optimal auctions revisited , 1998, Artif. Intell..

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[13]  Kazue Sako,et al.  An Auction Protocol Which Hides Bids of Losers , 2000, Public Key Cryptography.

[14]  Makoto Yokoo,et al.  Robust Combinatorial Auction Protocol against False-Name Bids , 2000, AAAI/IAAI.

[15]  Tuomas Sandholm,et al.  An algorithm for optimal winner determination in combinatorial auctions , 1999, IJCAI 1999.

[16]  Yoav Shoham,et al.  Truth revelation in approximately efficient combinatorial auctions , 2002, EC '99.

[17]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[18]  Rudolf Müller,et al.  Optimization in electronic markets: examples in combinatorial auctions , 2001 .

[19]  Masayuki Abe,et al.  M+1-st Price Auction Using Homomorphic Encryption , 2002, Public Key Cryptography.

[20]  Takahiro Watanabe,et al.  Sealed Bid Mulit-object Auctions with Necessary Bundles and Its Application to Spectrum Auctions , 2001, PRIMA.

[21]  A. Yao How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[22]  Matthew K. Franklin,et al.  The Design and Implementation of a Secure Auction Service , 1996, IEEE Trans. Software Eng..

[23]  P. Klemperer Auction Theory: A Guide to the Literature , 1999 .

[24]  Yoav Shoham,et al.  Taming the Computational Complexity of Combinatorial Auctions: Optimal and Approximate Approaches , 1999, IJCAI.

[25]  Koji Chida,et al.  Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison , 2001, ISC.

[26]  Ronald M. Harstad,et al.  Computationally Manageable Combinational Auctions , 1998 .

[27]  E. Rasmussen Games and Information , 1989 .

[28]  Hiroaki Kikuchi,et al.  Multi-round Anonymous Auction Protocols , 1999 .

[29]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[30]  Makoto Yokoo,et al.  Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.

[31]  Makoto Yokoo,et al.  An efficient approximate algorithm for winner determination in combinatorial auctions , 2000, EC '00.

[32]  Moshe Tennenholtz Some Tractable Combinatorial Auctions , 2000, AAAI/IAAI.

[33]  Jacques Stern,et al.  Non-interactive Private Auctions , 2002, Financial Cryptography.

[34]  M. D. Wilkinson,et al.  Management science , 1989, British Dental Journal.

[35]  Christian Cachin,et al.  Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.

[36]  Kunio Kobayashi,et al.  Efficient Sealed-Bid Auction Using Hash Chain , 2000, ICISC.

[37]  Hal R. Varian,et al.  Economic Mechanism Design for Computerized Agents , 1995, USENIX Workshop on Electronic Commerce.

[38]  Atsuko Miyaji,et al.  An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees , 2000, ISW.