(Im)possibility of unconditionally privacy-preserving auctions

We investigate how to obtain bid privacy in sealed-bid auctions. In particular, this paper focuses on unconditional full privacy, i.e., privacy that relies neither on trusted third parties (like auctioneers) or trusted fractions of bidders, nor on computational intractability assumptions (like the hardness of factoring). These constraints imply a scenario in which bidders exchange messages according to some predefined protocol in order to jointly determine the auction outcome without revealing any additional information. It turns out that the first-price sealed-bid auction can be emulated by an unconditionally fully private protocol. However, the protocolýs round complexity is exponential in the number of bits that represent a bid, and we show there is no more efficient protocol. On the other hand, we prove the impossibility of fully privately emulating the second-price sealed-bid (Vickrey) auction for more than two bidders. This impossibility holds even when relaxing various privacy constraints such as protecting just a single losing bid (while maintaining anonymity) or tolerating the revelation of complete information to a coalition of at least half of the bidders.

[1]  Pablo Noriega,et al.  Competitive scenarios for heterogeneous trading agents , 1998, AGENTS '98.

[2]  Eyal Kushilevitz,et al.  On the structure of the privacy hierarchy , 2004, Journal of Cryptology.

[3]  M. Rothkopf,et al.  Why Are Vickrey Auctions Rare? , 1990, Journal of Political Economy.

[4]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[5]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[6]  Michael P. Wellman,et al.  The Michigan Internet AuctionBot: a configurable auction server for human and software agents , 1998, AGENTS '98.

[7]  Felix Brandt,et al.  Fully Private Auctions in a Constant Number of Rounds , 2003, Financial Cryptography.

[8]  Eyal Kushilevitz,et al.  A zero-one law for Boolean privacy , 1989, STOC '89.

[9]  W. K. Vickery,et al.  Counter-Speculation Auctions and Competitive Sealed Tenders , 1961 .

[10]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[11]  Silvio Micali,et al.  The All-or-Nothing Nature of Two-Party Secure Computation , 1999, CRYPTO.

[12]  David Chaum,et al.  Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.

[13]  Tuomas Sandholm,et al.  Preference elicitation in combinatorial auctions , 2001, AAMAS '02.

[14]  Felix Brandt,et al.  Cryptographic Protocols for Secure Second-Price Auctions , 2001, CIA.

[15]  Josh Benaloh,et al.  Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.

[16]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[17]  Michael H. Rothkopf,et al.  Two Models of Bid-Taker Cheating in Vickrey Auctions , 1995 .

[18]  Tuomas Sandholm eMediator: A Next Generation Electronic Commerce Server , 2002, Comput. Intell..

[19]  Tuomas Sandholm,et al.  Issues in Computational Vickrey Auctions , 2000, Int. J. Electron. Commer..

[20]  Eyal Kushilevitz,et al.  Privacy and communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.

[21]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[22]  Makoto Yokoo,et al.  Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.

[23]  Hiroaki Kikuchi,et al.  (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.

[24]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 1, Basic Tools , 2001 .

[25]  Masayuki Abe,et al.  M+1-st Price Auction Using Homomorphic Encryption , 2002, Public Key Cryptography.

[26]  Pablo Noriega,et al.  FM96.5 A Java-based Electronic Auction House , 1997, PAAM.

[27]  Reuven Bar-Yehuda,et al.  Privacy, additional information, and communication , 1990, Proceedings Fifth Annual Structure in Complexity Theory Conference.

[28]  Wilfried Brauer,et al.  Task Assignment in Multiagent Systems Based on Vickrey-Type Auctioning and Leveled Commitment Contracting , 2000, CIA.