Multi-round Anonymous Auction Protocols

SUMMARY Auctions are a critical element of the electronic commerce infrastructure. But for real-time applications, auctions are a potential problem – they can cause significant time delays. Thus, for most real-time applications, sealed-bid auctions are recommended. But how do we handle tie-breaking in sealed-bid auctions? This paper analyzes the use of multi-round auctions where the winners from an auction round participate in a subsequent tie-breaking second auction round. We perform this analysis over the classical first-price sealed-bid auction that has been modified to provide full anonymity. We analyze the expected number of rounds and optimal values to minimize communication costs.

[1]  A. Mas-Colell,et al.  Microeconomic Theory , 1995 .

[2]  David Chaum,et al.  Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result , 1987, CRYPTO.

[3]  Paul R. Milgrom,et al.  Auctions and Bidding: A Primer , 1989 .

[4]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[5]  David Chaum,et al.  Multiparty unconditionally secure protocols , 1988, STOC '88.

[6]  R. McAfee,et al.  Auctions and Bidding , 1986 .

[7]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[8]  Matthew K. Franklin,et al.  The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[9]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[10]  Joan Feigenbaum,et al.  Security with Low Communication Overhead , 1990, CRYPTO.

[11]  Silvio Micali,et al.  The round complexity of secure protocols , 1990, STOC '90.

[12]  J. Doug Tygar,et al.  Electronic Auctions with Private Bids , 1998, USENIX Workshop on Electronic Commerce.

[13]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[14]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[15]  Donald Beaver,et al.  Multiparty Computation with Faulty Majority , 1989, CRYPTO.

[16]  David Clark,et al.  Internet cost allocation and pricing , 1997 .

[17]  B. Klopfenstein Internet Economics , 1998 .

[18]  Adi Shamir,et al.  How to share a secret , 1979, CACM.