A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation

In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, threshold cryptography and security engineering to implement secure auctions for practical real-world problems.

[1]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[2]  Ran Canetti,et al.  Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Ivan Damgård,et al.  Multiparty Computation from Threshold Homomorphic Encryption , 2000, EUROCRYPT.

[5]  Felix Brandt,et al.  Efficient Privacy-Preserving Protocols for Multi-unit Auctions , 2005, Financial Cryptography.

[6]  Matthew K. Franklin,et al.  The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[7]  P. Klemperer Auction Theory: A Guide to the Literature , 1999 .

[8]  Joan Feigenbaum,et al.  Secure computation of surveys , 2004 .

[9]  Benny Pinkas,et al.  Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .

[10]  Felix Brandt,et al.  Cryptographic Protocols for Secure Second-Price Auctions , 2001, CIA.

[11]  Jan Camenisch,et al.  Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products , 2002, CRYPTO.

[12]  Yuval Ishai,et al.  Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.

[13]  Benny Pinkas,et al.  Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.

[14]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[15]  Matthias Fitzi,et al.  How to Split a Shared Secret into Shared Bits in Constant-Round , 2005, IACR Cryptol. ePrint Arch..

[16]  Valtteri Niemi,et al.  Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.

[17]  Ho-fung Leung,et al.  Secure Double Auction Protocols with Full Privacy Protection , 2003, ICISC.

[18]  Dieter Nautz Optimal bidding in multi-unit auctions with many bidders , 1995 .