Privacy-preserving Double Auction Mechanism Based on Homomorphic Encryption and Sorting Networks

As an effective resource allocation approach, double auctions (DAs) have been extensively studied in electronic commerce. Most previous studies have focused on how to design strategy-proof DA mechanisms, while not much research effort has been done concerning privacy and security issues. However, security, especially privacy issues have become such a public concern that the European governments lay down the law to enforce the privacy guarantees recently. In this paper, to address the privacy issue in electronic auctions, we concentrate on how to design a privacy-preserving mechanism for double auctions by employing Goldwasser-Micali homomorphic encryption and sorting networks. We achieve provable privacy such that the auctions do not reveal any bid information except the auction results, resulting in a strict privacy guarantee. Moreover, to achieve practical system performance, we compare different sorting algorithms, and suggest using the faster ones. Experimental results show that different sorting algorithms may have great effect on the performance of our mechanism, and demonstrate the practicality of our protocol for real-world applications in electronic commerce.

[1]  Leandros Tassiulas,et al.  A Double-Auction Mechanism for Mobile Data-Offloading Markets , 2015, IEEE/ACM Transactions on Networking.

[2]  Makoto Yokoo,et al.  Secure Generalized Vickrey Auction without Third-party Servers , 2004, Financial Cryptography.

[3]  Bart de Keijzer,et al.  Approximately Efficient Double Auctions with Strong Budget Balance , 2016, SODA.

[4]  Ahmad-Reza Sadeghi,et al.  Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..

[5]  Nicholas R. Jennings,et al.  An equilibrium analysis of trading across multiple double auction marketplaces using fictitious play , 2016, Electron. Commer. Res. Appl..

[6]  Ahmad Baraani-Dastjerdi,et al.  Bidding strategy for agents in multi-attribute combinatorial double auction , 2015, Expert Syst. Appl..

[7]  Liusheng Huang,et al.  On Privacy-Preserving Cloud Auction , 2016, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS).

[8]  Manuel Blum,et al.  An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information , 1985, CRYPTO.

[9]  R. McAfee,et al.  A dominant strategy double auction , 1992 .

[10]  Simon Parsons,et al.  On the effects of competition between agent-based double auction markets , 2014, Electron. Commer. Res. Appl..

[11]  Yehuda Lindell,et al.  Efficient Secure Two-Party Protocols: Techniques and Constructions , 2010 .

[12]  Praveen Gauravaram,et al.  Updates on Sorting of Fully Homomorphic Encrypted Data , 2015, 2015 International Conference on Cloud Computing Research and Innovation (ICCCRI).

[13]  Makoto Yokoo,et al.  Secure Generalized Vickrey Auction Using Homomorphic Encryption , 2003, Financial Cryptography.

[14]  Liusheng Huang,et al.  ITSEC: An information-theoretically secure framework for truthful spectrum auctions , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[15]  Ho-fung Leung,et al.  An Adaptive Attitude Bidding Strategy for Agents in Continuous Double Auctions , 2005, EEE.

[16]  Lu Li,et al.  Secure double spectrum auctions , 2015, 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS).

[17]  Ed Dawson,et al.  Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction , 2002, ICICS.

[18]  Muriati Mukhtar,et al.  A combinatorial double auction resource allocation model in cloud computing , 2016, Inf. Sci..

[19]  Wenliang Du,et al.  Bureaucratic protocols for secure two-party sorting, selection, and permuting , 2010, ASIACCS '10.

[20]  Fan Wu,et al.  SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism , 2013, 2013 Proceedings IEEE INFOCOM.

[21]  Fei Wang,et al.  PS-TRUST: Provably secure solution for truthful double spectrum auctions , 2013, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[22]  XiaoHua Xu,et al.  TODA: Truthful Online Double Auction for Spectrum Allocation in Wireless Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[23]  Dongrui Fan,et al.  High performance comparison-based sorting algorithm on many-core GPUs , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS).

[24]  SamimiParnia,et al.  A combinatorial double auction resource allocation model in cloud computing , 2016 .

[25]  Elmar Wolfstetter,et al.  Bid Rigging - an Analysis of Corruption in Auctions , 2005, SSRN Electronic Journal.

[26]  Song Guo,et al.  A Truthful Double Auction for Device-to-Device Communications in Cellular Networks , 2016, IEEE Journal on Selected Areas in Communications.