Fully private auctions for the highest bid

We present a secure auction scheme with affordable computations and communication complexity. In this scheme, we use blockchain to publish commitment and some public messages only. All bidders are forced to perform protocol honestly and are not permitted to change or retract their bids. To preserve privacy, we use insulated ciphertext comparison protocol to compare the bids. Our scheme is more efficient than traditional auctions using MPC/ZKP primitives. The total number of interaction rounds for N bidders is 3(N - 1). Furthermore, when the comparisons is performed in parallel, the number of rounds dramatically decreases to 3 log N.

[1]  Benny Pinkas,et al.  Maturity and Performance of Programmable Secure Computation , 2016, IEEE Security & Privacy.

[2]  Felix Brandt,et al.  Fully Private Auctions in a Constant Number of Rounds , 2003, Financial Cryptography.

[3]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[4]  Florian Kerschbaum,et al.  Strain: A Secure Auction for Blockchains , 2018, IACR Cryptol. ePrint Arch..

[5]  Yehuda Lindell,et al.  Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ , 2015, IACR Cryptol. ePrint Arch..

[6]  Iddo Bentov,et al.  How to Use Bitcoin to Design Fair Protocols , 2014, CRYPTO.

[7]  Cooperative Strategies and Alliances , 2003 .

[8]  Amr M. Youssef,et al.  Verifiable Sealed-Bid Auction on the Ethereum Blockchain , 2018, IACR Cryptol. ePrint Arch..

[9]  David Cerezo Sánchez Raziel: Private and Verifiable Smart Contracts on Blockchains , 2018, IACR Cryptol. ePrint Arch..

[10]  Pim Tuyls,et al.  Practical Two-Party Computation Based on the Conditional Gate , 2004, ASIACRYPT.

[11]  Iddo Bentov,et al.  Amortizing Secure Computation with Penalties , 2016, CCS.

[12]  Dusit Niyato,et al.  Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks , 2018, IEEE Transactions on Parallel and Distributed Systems.

[13]  F. Contractor Cooperative Strategies and Alliances in International Business , 2002 .

[14]  Vinod Vaikuntanathan,et al.  Improvements to Secure Computation with Penalties , 2016, CCS.

[15]  Marcin Andrychowicz,et al.  Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[16]  Aleksander Essex,et al.  Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons , 2018, IACR Cryptol. ePrint Arch..