On cheating in sealed-bid auctions

Motivated by the rise of online auctions and their relative lack of security, this paper analyzes two forms of cheating in sealed-bid auctions. The first type of cheating we consider occurs when the seller spies on the bids of a second-price auction and then inserts a fake bid in order to increase the payment of the winning bidder. In the second type, a bidder cheats in a first-price auction by examining the competing bids before deciding on his own bid. In both cases, we derive equilibrium strategies when bidders are aware of the possibility of cheating. These results provide insights into sealed-bid auctions even in the absence of cheating, including some counterintuitive results on the effects of overbidding in a first-price auction.footnotetext[1]This work was supported in part by DARPA grant F30602-00-2-0598.

[1]  Paul R. Milgrom,et al.  A theory of auctions and competitive bidding , 1982 .

[2]  J. Doug Tygar,et al.  Electronic Auctions with Private Bids , 1998, USENIX Workshop on Electronic Commerce.

[3]  Jesse A. Schwartz,et al.  Collusive Bidding in the FCC Spectrum Auctions , 2001 .

[4]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[5]  Moshe Tennenholtz,et al.  Competitive Safety Analysis: Robust Decision-Making in Multi-Agent Systems , 2002, J. Artif. Intell. Res..

[6]  Yoav Shoham,et al.  On cheating in sealed-bid auctions , 2003, EC '03.

[7]  Andrew Whinston,et al.  Building Trust in Online Auction Markets Through an Economic Incentive Mechanism , 2003 .

[8]  Michael H. Rothkopf,et al.  Two Models of Bid-Taker Cheating in Vickrey Auctions , 1995 .

[9]  Felix Brandt,et al.  Fully Private Auctions in a Constant Number of Rounds , 2003, Financial Cryptography.

[10]  Ronald M. Harstad,et al.  Equilibrium bid functions for auctions with an uncertain number of bidders , 1990 .

[11]  Tuomas Sandholm,et al.  Auctions with untrustworthy bidders , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[12]  E. C. Capen,et al.  Competitive Bidding in High-Risk Situations , 1971 .

[13]  Makoto Yokoo,et al.  Robust Combinatorial Auction Protocol against False-Name Bids , 2000, AAAI/IAAI.

[14]  Matthew K. Franklin,et al.  The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[15]  D. Graham,et al.  Collusive Bidder Behavior at Single-Object Second-Price and English Auctions , 1987, Journal of Political Economy.

[16]  W. C. Riddell,et al.  Bargaining under Uncertainty , 1981 .

[17]  H. Nurmi,et al.  Cryptographic protocols for Vickrey auctions , 1993 .

[18]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[19]  M. Rothkopf On Auctions with Withdrawable Winning Bids , 1991 .

[20]  Moshe Tennenholtz,et al.  Mechanism Design with Execution Uncertainty , 2002, UAI.

[21]  Andrew B. Whinston,et al.  Building Trust in Online Auction Markets Through an Economic Incentive Mechanism , 2003, Decis. Support Syst..

[22]  P. Klemperer Auction Theory: A Guide to the Literature , 1999 .

[23]  J. Asker,et al.  Bidding Rings , 2022 .