(Im)possibility of unconditionally privacy-preserving auctions
暂无分享,去创建一个
[1] Pablo Noriega,et al. Competitive scenarios for heterogeneous trading agents , 1998, AGENTS '98.
[2] Eyal Kushilevitz,et al. On the structure of the privacy hierarchy , 2004, Journal of Cryptology.
[3] M. Rothkopf,et al. Why Are Vickrey Auctions Rare? , 1990, Journal of Political Economy.
[4] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[5] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[6] Michael P. Wellman,et al. The Michigan Internet AuctionBot: a configurable auction server for human and software agents , 1998, AGENTS '98.
[7] Felix Brandt,et al. Fully Private Auctions in a Constant Number of Rounds , 2003, Financial Cryptography.
[8] Eyal Kushilevitz,et al. A zero-one law for Boolean privacy , 1989, STOC '89.
[9] W. K. Vickery,et al. Counter-Speculation Auctions and Competitive Sealed Tenders , 1961 .
[10] William Vickrey,et al. Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .
[11] Silvio Micali,et al. The All-or-Nothing Nature of Two-Party Secure Computation , 1999, CRYPTO.
[12] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[13] Tuomas Sandholm,et al. Preference elicitation in combinatorial auctions , 2001, AAMAS '02.
[14] Felix Brandt,et al. Cryptographic Protocols for Secure Second-Price Auctions , 2001, CIA.
[15] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[16] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[17] Michael H. Rothkopf,et al. Two Models of Bid-Taker Cheating in Vickrey Auctions , 1995 .
[18] Tuomas Sandholm. eMediator: A Next Generation Electronic Commerce Server , 2002, Comput. Intell..
[19] Tuomas Sandholm,et al. Issues in Computational Vickrey Auctions , 2000, Int. J. Electron. Commer..
[20] Eyal Kushilevitz,et al. Privacy and communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.
[21] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[22] Makoto Yokoo,et al. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.
[23] Hiroaki Kikuchi,et al. (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.
[24] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[25] Masayuki Abe,et al. M+1-st Price Auction Using Homomorphic Encryption , 2002, Public Key Cryptography.
[26] Pablo Noriega,et al. FM96.5 A Java-based Electronic Auction House , 1997, PAAM.
[27] Reuven Bar-Yehuda,et al. Privacy, additional information, and communication , 1990, Proceedings Fifth Annual Structure in Complexity Theory Conference.
[28] Wilfried Brauer,et al. Task Assignment in Multiagent Systems Based on Vickrey-Type Auctioning and Leveled Commitment Contracting , 2000, CIA.