A protocol for verification of an auction without revealing bid values
暂无分享,去创建一个
[1] Makoto Yokoo,et al. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.
[2] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[3] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[4] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[5] Masayuki Abe,et al. M+1-st Price Auction Using Homomorphic Encryption , 2002, Public Key Cryptography.
[6] Ronald Cramer,et al. A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..
[7] Makoto Yokoo,et al. Secure Generalized Vickrey Auction without Third-party Servers , 2004, Financial Cryptography.
[8] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[9] Hiroaki Kikuchi,et al. (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.
[10] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[11] Josiane Nzouonta,et al. An Algorithm for Clearing Combinatorial Markets , 2003 .
[12] Felix Brandt,et al. How to obtain full privacy in auctions , 2006, International Journal of Information Security.
[13] Yong Zhao,et al. Falkon: a Fast and Light-weight tasK executiON framework , 2007, Proceedings of the 2007 ACM/IEEE Conference on Supercomputing (SC '07).
[14] Tor Helleseth,et al. Workshop on the theory and application of cryptographic techniques on Advances in cryptology , 1994 .
[15] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[16] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[17] Becky Verastegui,et al. Proceedings of the 2007 ACM/IEEE conference on Supercomputing , 2007, HiPC 2007.
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.
[19] Valtteri Niemi,et al. Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.
[20] Makoto Yokoo,et al. Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.