Secure second price auctions with a rational auctioneer

We present novel security requirements for second price auctions and a simple, efficient and practical protocol that provably maintains these requirements. Novel requirements are needed because commonly used requirements, such as the indistinguishability-based secrecy requirement of encryption schemes presented by (Goldwasser and Micali, 1982), do not fit properly in the second price auctions context. Additionally, the presented protocol uses a trustworthy supervisor that checks if the auctioneer deviated from the protocol and fines him accordingly. By making sure the expected utility of the auctioneer when deviating from the protocol is lower than his expected utility when abiding by the protocol we ascertain that a rational auctioneer will abide by the protocol. This allows the supervisor to optimize by performing (computationally-intensive) inspections of the auctioneer with only low probability.

[1]  Valtteri Niemi,et al.  Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.

[2]  Moni Naor,et al.  Nonmalleable Cryptography , 2000, SIAM Rev..

[3]  Moni Naor,et al.  Timed Commitments , 2000, CRYPTO.

[4]  Mihir Bellare,et al.  Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.

[5]  J. Doug Tygar,et al.  Electronic Auctions with Private Bids , 1998, USENIX Workshop on Electronic Commerce.

[6]  R. Engelbrecht-Wiggans Auctions and Bidding Models: A Survey , 1979 .

[7]  David C. Parkes,et al.  Practical secrecy-preserving, verifiably correct and trustworthy auctions , 2006, ICEC '06.

[8]  Felix Brandt,et al.  How to obtain full privacy in auctions , 2006, International Journal of Information Security.

[9]  Moni Naor,et al.  Non-malleable cryptography , 1991, STOC '91.

[10]  Abhi Shelat,et al.  Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One , 2006, CRYPTO.

[11]  Paul R. Milgrom,et al.  A theory of auctions and competitive bidding , 1982 .

[12]  JoAnne Yates,et al.  Electronic markets and electronic hierarchies , 1987, CACM.

[13]  William Samuelson Auctions in Theory and Practice , 2002 .

[14]  Mihir Bellare,et al.  Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions , 2003, EUROCRYPT.

[15]  Ronald L. Rivest,et al.  Time-lock Puzzles and Timed-release Crypto , 1996 .

[16]  Amit Sahai,et al.  Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization , 1999, CRYPTO.

[17]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[18]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[19]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[20]  P. Resnick,et al.  Roles for Electronic Brokers , 1994 .

[21]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[22]  Martin Bichler,et al.  A Brokerage Framework for Internet Commerce , 1999, Distributed and Parallel Databases.

[23]  Christopher Thorpe,et al.  Time-Lapse Cryptography , 2006 .

[24]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.