Cryptographic Protocols for Secure Second-Price Auctions

In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not least electronic commerce. In many cases the Vickrey (second-price sealed-bid) auction is used as a protocol that prescribes how the individual agents have to interact in order to come to an agreement. The main reasons for choosing the Vickrey auction are the existence of a dominant strategy equilibrium, the low bandwidth and time consumption due to just one round of bidding and the (theoretical) privacy of bids. This paper specifies properties that are needed to ensure the accurate and secret execution of Vickrey auctions and provides a classification of different forms of collusion. We approach the two major security concerns of the Vickrey auction: the vulnerability to a lying auctioneer and the reluctance of bidders to reveal their private valuations. We then propose a novel technique that allows to securely perform second-price auctions. This is achieved using the announcement of encrypted binary bidding lists on a blackboard. Top-down, bottom-up and binary search techniques are used to interactively find the second highest bid step by step without revealing unnecessary information.

[1]  Gerhard Weiss,et al.  Multiagent systems: a modern approach to distributed artificial intelligence , 1999 .

[2]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[3]  Matthew K. Franklin,et al.  The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[4]  Wilfried Brauer,et al.  Task Assignment in Multiagent Systems Based on Vickrey-Type Auctioning and Leveled Commitment Contracting , 2000, CIA.

[5]  Jacques Stern,et al.  Non-interactive Private Auctions , 2002, Financial Cryptography.

[6]  Nicholas R. Jennings,et al.  Foundations of distributed artificial intelligence , 1996, Sixth-generation computer technology series.

[7]  W. K. Vickery,et al.  Counter-Speculation Auctions and Competitive Sealed Tenders , 1961 .

[8]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[9]  Ketil Danielsen,et al.  User Control Modes and IP Allocation , 1995 .

[10]  Michael H. Rothkopf,et al.  Two Models of Bid-Taker Cheating in Vickrey Auctions , 1995 .

[11]  Markus Jakobsson,et al.  Mix and Match: Secure Function Evaluation via Ciphertexts , 2000, ASIACRYPT.

[12]  Scott H. Clearwater,et al.  A Multi-Agent System for Controlling Building Environments , 1995, ICMAS.

[13]  Michiharu Kudo,et al.  Secure Electronic Sealed-Bid Auction Protocol with Public Key Cryptography (Special Section on Cryptography and Information Security) , 1998 .

[14]  Gerhard Weiß,et al.  Vicious strategies for Vickrey auctions , 2001, AGENTS '01.

[15]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[16]  Paul R. Milgrom,et al.  A theory of auctions and competitive bidding , 1982 .

[17]  Julie A. Adams,et al.  Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence , 2001, AI Mag..

[18]  T. Sandholm Limitations of the Vickrey Auction in Computational Multiagent Systems , 1996 .

[19]  E. Drexler,et al.  Incentive engineering for computational resource management , 1988 .

[20]  Dawn Xiaodong Song,et al.  Secure Auctions in a Publish/Subscribe System , 2000 .

[21]  J. Doug Tygar,et al.  Electronic Auctions with Private Bids , 1998, USENIX Workshop on Electronic Commerce.

[22]  Shohachiro Nakanishi,et al.  Distributed auction servers resolving winner and winning bid without revealing privacy of bids , 2000, Proceedings Seventh International Conference on Parallel and Distributed Systems: Workshops.

[23]  Tad Hogg,et al.  Spawn: A Distributed Computational Economy , 1992, IEEE Trans. Software Eng..

[24]  Hiroaki Kikuchi,et al.  (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.

[25]  Jacques Ferber,et al.  Multi-agent systems - an introduction to distributed artificial intelligence , 1999 .

[26]  R. McAfee,et al.  Auctions and Bidding , 1986 .

[27]  M. Rothkopf,et al.  Why Are Vickrey Auctions Rare? , 1990, Journal of Political Economy.

[28]  Gerhard Weiss,et al.  Multiagent Systems , 1999 .