Security, anonymity and trust in electronic auctions

Auctioning items over the Internet is a popular and lucrative industry.There are now many companies that conduct auctions online such as eBay [5] and onSale [10]. Online auctions have geographical advantages over traditional auctions as buyers and sellers are not required to be physically present at a central location (such as a hall or open air venue). This allows online auctions to be much larger and more elaborate than traditional auctions.However, it also provides opportunities for the auction participants to cheat. A bidder can cheat by repudiating bids, failing to pay, or colluding with other bidders to affect the settlement price.Likewise, the seller of the item might fail to deliver the goods, or could be in collusion with some of the bidders.Someone could also forge a bid in an attempt to frame a bidder, or introduce fake bids in order to influence the auction proceedings. Furthermore, bidders are required to trust the auctioneer with their identity and bid information.A corrupt auctioneer could award the auction to someone other than the legitimate winner.A bidder's personal information could also be sold to marketing agencies, or used for malicious purposes. Commercial auction sites fail in many of the aforementioned circumstances. These sites only offer basic solutions that are designed to "clean up" after wrongdoing has taken place.However, cryptography can be used to solve some of these problems up-front.An "electronic auction" is a cryptographic scheme designed to securely conduct auctions while protecting the identities of the bidders. In this article we describe two popular types of electronic auctions. We discuss the security issues associated with conducting these auctions and contrast the differing anonymity requirements.We also identify four main strategies for reducing the trust that bidders must place in the auctioneer.Furthermore, we present a basic example of an electronic auction scheme.This is used to illustrate the complexity involved in designing a secure and anonymous auction scheme. Finally, we discuss some of our research with regard to using group signature schemes to constructelectronic auctions.

[1]  William Vickrey,et al.  Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .

[2]  Jacques Traoré,et al.  An Online Public Auction Protocol Protecting Bidder Privacy , 2000, ACISP.

[3]  W. K. Vickery,et al.  Counter-Speculation Auctions and Competitive Sealed Tenders , 1961 .

[4]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[5]  Jarrod Trevathan,et al.  An Anonymous and Secure Continuous Double Auction Scheme , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[6]  Colin Boyd,et al.  Security Issues for Electronic Auctions , 2000 .

[7]  Ho-fung Leung,et al.  Anonymity and security in continuous double auctions for Internet retails market , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[8]  Matthew K. Franklin,et al.  The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[9]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[10]  Atsuko Miyaji,et al.  A Practical English Auction with One-Time Registration , 2001, ACISP.

[11]  Felix Brandt,et al.  Fully Private Auctions in a Constant Number of Rounds , 2003, Financial Cryptography.

[12]  R. Cassady Auctions and Auctioneering , 2023 .

[13]  Jarrod Trevathan,et al.  Design issues for electronic auctions , 2005, ICETE.

[14]  Roland Sauerbrey,et al.  Biography , 1992, Ann. Pure Appl. Log..