Efficient, Verifiable and Privacy-Preserving Combinatorial Auction Design

We propose a construction to efficiently and securely compute a combinatorial auction (also referred as combinational auction) which is able to forbid participants (both auctioneer and the bidders) from learning unnecessary information except those implied in the output of the auction. The auctioneer and bidders are assumed to be untrusted, and they may misbehave throughout the protocol to illegally increase their own benefit. Therefore, we need to either prevent the misbehavior or detect the misbehavior. We achieve this goal by introducing a payment mechanism to control bidders' behaviors game-theoretically, and we further introduce a blind signature scheme to let bidders ver- ify the authenticity of their payment reported by the auctioneer. Although a third-party signer is involved, he only signs a value blindly (i.e. without knowing the value) and is also untrusted. Moreover, our construction requires at most O(mn 2 ) rounds of the communication between bidders and the auctioneer where m is the total number of goods and n is the total number of bidders, and the extra computation overhead incurred by our design is very efficient.

[1]  Noam Nisan,et al.  Approximation algorithms for combinatorial auctions with complement-free bidders , 2005, STOC '05.

[2]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[3]  Bo Li,et al.  TAHES: Truthful double Auction for Heterogeneous Spectrums , 2012, 2012 Proceedings IEEE INFOCOM.

[4]  Eyal Kushilevitz Privacy and Communication Complexity , 1992, SIAM J. Discret. Math..

[5]  Jan Camenisch,et al.  Blind Signatures Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.

[6]  Hung-Yu Wei,et al.  Dynamic Auction Mechanism for Cloud Resource Allocation , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.

[7]  Christian Cachin,et al.  Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.

[8]  S. Rassenti,et al.  A Combinatorial Auction Mechanism for Airport Time Slot Allocation , 1982 .

[9]  Makoto Yokoo,et al.  Secure Generalized Vickrey Auction without Third-party Servers , 2004, Financial Cryptography.

[10]  Ronald M. Harstad,et al.  Computationally Manageable Combinational Auctions , 1998 .

[11]  Jeffrey K. MacKie-Mason,et al.  Generalized Vickrey Auctions , 1994 .

[12]  David Levine,et al.  CABOB: A Fast Optimal Algorithm for Combinatorial Auctions , 2001, IJCAI.

[13]  Hal R. Varian,et al.  Economic Mechanism Design for Computerized Agents , 1995, USENIX Workshop on Electronic Commerce.

[14]  Eyal Kushilevitz,et al.  A zero-one law for Boolean privacy , 1989, STOC '89.

[15]  Felix Brandt,et al.  On the Existence of Unconditionally Privacy-Preserving Auction Protocols , 2008, TSEC.

[16]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[17]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[18]  Roger B. Myerson,et al.  Optimal Auction Design , 1981, Math. Oper. Res..

[19]  Xinbing Wang,et al.  Spectrum Sharing in Cognitive Radio Networks—An Auction-Based Approach , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[20]  Rainer A. Rueppel,et al.  A new signature scheme based on the DSA giving message recovery , 1993, CCS '93.

[21]  Miao Pan,et al.  Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer , 2012, Wirel. Networks.

[22]  Tuomas Sandholm,et al.  Algorithm for optimal winner determination in combinatorial auctions , 2002, Artif. Intell..

[23]  Xiang-Yang Li,et al.  Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets , 2013, ArXiv.

[24]  Shaojie Tang,et al.  Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation , 2013, 2013 Proceedings IEEE INFOCOM.

[25]  Ian Welch,et al.  Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction , 2011, AISC.

[26]  Manoj Kumar Tiwari,et al.  Auction-based approach to resolve the scheduling problem in the steel making process , 2006 .

[27]  Taeho Jung,et al.  Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.

[28]  Takayuki Ito,et al.  Task Allocation in the RoboCup Rescue Simulation Domain: A Short Note , 2001, RoboCup.

[29]  Sven de Vries,et al.  Combinatorial Auctions: A Survey , 2003, INFORMS J. Comput..

[30]  Miao Pan,et al.  Economic-robust transmission opportunity auction in multi-hop wireless networks , 2013, 2013 Proceedings IEEE INFOCOM.

[31]  Nicole Immorlica,et al.  Dynamics of bid optimization in online advertisement auctions , 2007, WWW '07.

[32]  Felix Brandt,et al.  Efficient Privacy-Preserving Protocols for Multi-unit Auctions , 2005, Financial Cryptography.

[33]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[34]  Yoav Shoham,et al.  Combinatorial Auctions , 2005, Encyclopedia of Wireless Networks.

[35]  Paul F. Syverson,et al.  Fair On-Line Auctions without Special Trusted Parties , 1999, Financial Cryptography.

[36]  K. K. Ramakrishnan,et al.  iDEAL: Incentivized Dynamic Cellular Offloading via Auctions , 2013, IEEE/ACM Transactions on Networking.

[37]  Yunhao Liu,et al.  Verifiable private multi-party computation: Ranging and ranking , 2013, 2013 Proceedings IEEE INFOCOM.

[38]  Xiang-Yang Li,et al.  Privacy preserving cloud data access with multi-authorities , 2012, 2013 Proceedings IEEE INFOCOM.

[39]  Fan Wu,et al.  SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.

[40]  Silvio Micali,et al.  Robustly Leveraging Collusion in Combinatorial Auctions , 2010, ICS.

[41]  Makoto Yokoo,et al.  Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.

[42]  Makoto Yokoo,et al.  Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.

[43]  Marceau Coupechoux,et al.  An Auction Framework for Spectrum Allocation with Interference Constraint in Cognitive Radio Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[44]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[45]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[46]  Noam Nisan,et al.  Truthful approximation mechanisms for restricted combinatorial auctions , 2008, Games Econ. Behav..

[47]  Kunio Kobayashi,et al.  Efficient Sealed-Bid Auction Using Hash Chain , 2000, ICISC.