Secure Computing, Economy, and Trust: A Generic Solution for Secure Auctions with Real-World Applications

In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems. In essence this paper is an overview of the research project SCET--Secure Computing, Economy, and Trust-- which attempts to build auctions for real applications using secure multiparty computation. The main contributions of this project are: A generic setup for secure evaluation of integer arithmetic including comparisons; general double auctions expressed by such operations; a real world double auction tailored to the complexity and performance of the basic primitives '+' and '<='; and finally evidence that our approach is practically feasible based on experiments with prototypes.

[1]  Benny Pinkas,et al.  Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.

[2]  R. McAfee,et al.  A dominant strategy double auction , 1992 .

[3]  F. Brandt Private Public Choice , 2003 .

[4]  Felix Brandt,et al.  Cryptographic Protocols for Secure Second-Price Auctions , 2001, CIA.

[5]  Olivier Danvy,et al.  On the dynamic extent of delimited continuations , 2005, Inf. Process. Lett..

[6]  Felix Brandt,et al.  Efficient Privacy-Preserving Protocols for Multi-unit Auctions , 2005, Financial Cryptography.

[7]  Ran Canetti,et al.  Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[8]  Olivier Danvy,et al.  Program Extraction From Proofs of Weak Head Normalization , 2005, MFPS.

[9]  Peter Bro Miltersen,et al.  Reviewing bounds on the circuit size of the hardest functions , 2005, Inf. Process. Lett..

[10]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[11]  Christian Cachin,et al.  Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.

[12]  Olivier Danvy,et al.  An Operational Foundation for Delimited Continuations in the CPS Hierarchy , 2005, Log. Methods Comput. Sci..

[13]  Michael P. Wellman,et al.  Walverine: a Walrasian trading agent , 2003, AAMAS '03.

[14]  Valtteri Niemi,et al.  Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.

[15]  Steven R. Williams,et al.  The Rate of Convergence to Efficiency in the Buyer's Bid Double Auction as the Market Becomes Large , 1989 .

[16]  Matthew K. Franklin,et al.  The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[17]  Dieter Nautz Optimal bidding in multi-unit auctions with many bidders , 1995 .

[18]  P. Klemperer Auction Theory: A Guide to the Literature , 1999 .

[19]  Robert H. Wilson Incentive Efficiency of Double Auctions , 1985 .

[20]  Olivier Danvy,et al.  On obtaining the Boyer-Moore string-matching algorithm by partial evaluation , 2006, Inf. Process. Lett..

[21]  J. Laffont Advances in Economic Theory , 1995 .

[22]  Martin Shubik,et al.  A strategic market game with complete markets , 1990 .

[23]  Ivan Damgård,et al.  A Quantum Cipher with Near Optimal Key-Recycling , 2005, CRYPTO.

[24]  Ho-fung Leung,et al.  Secure Double Auction Protocols with Full Privacy Protection , 2003, ICISC.

[25]  Sven de Vries,et al.  Combinatorial Auctions: A Survey , 2003, INFORMS J. Comput..

[26]  O. Danvy,et al.  A Simple Proof of a Folklore Theorem about Delimited Control , 2005 .

[27]  M. Rothkopf,et al.  Why Are Vickrey Auctions Rare? , 1990, Journal of Political Economy.

[28]  Ivan Damgård,et al.  Multiparty Computation from Threshold Homomorphic Encryption , 2000, EUROCRYPT.

[29]  T. Bewley Advances in Economic Theory: Fifth World Congress , 2009 .

[30]  Daniel Friedman,et al.  Competitivity in Auction Markets: An Experimental and Theoretical Investigation , 1995 .

[31]  Jan Camenisch,et al.  Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products , 2002, CRYPTO.

[32]  A. Yao How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[33]  Kiho Yoon,et al.  The Modified Vickrey Double Auction , 2001, J. Econ. Theory.

[34]  David Porter,et al.  Combinatorial auction design , 2003, Proceedings of the National Academy of Sciences of the United States of America.

[35]  Joan Feigenbaum,et al.  Secure computation of surveys , 2004 .

[36]  Edith Elkind,et al.  Interleaving Cryptography and Mechanism Design: The Case of Online Auctions , 2004, Financial Cryptography.

[37]  Michael B. Gordy Hedging Winner's Curse with Multiple Bids: Evidence from the Portuguese Treasury Bill Auction , 1999, Review of Economics and Statistics.

[38]  Silvio Micali,et al.  The Round Complexity of Secure Protocols (Extended Abstract) , 1990, STOC 1990.

[39]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[40]  Shai Halevi,et al.  A Cryptographic Solution to a Game Theoretic Problem , 2000, CRYPTO.

[41]  Léon Walras Éléments d'économie politique pure , 1889 .

[42]  Ho-fung Leung,et al.  Anonymity and security in continuous double auctions for Internet retails market , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[43]  Yuval Ishai,et al.  Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.

[44]  Michael P. Wellman,et al.  The WALRAS Algorithm: A Convergent Distributed Implementation of General Equilibrium Outcomes , 1998 .

[45]  Peter Cramton,et al.  Electricity market design: the good, the bad, and the ugly , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[46]  Olivier Danvy,et al.  A concrete framework for environment machines , 2005, TOCL.

[47]  M. Satterthwaite,et al.  Efficient Mechanisms for Bilateral Trading , 1983 .