A protocol for verification of an auction without revealing bid values

Auctions have been proposed for allocating computation resources for Cloud computing. However, many security issues exist with electronic auctions including insider trading, private information revelation, bid filtering, and auctioneers lying about auction results for their own profit. Privacy preserving auction protocols use cryptographic methods to keep losing bid values secret but many have no means of verifying their black box behaviour. This paper presents a protocol that allows participants to verify that an auction has run correctly without revealing bid values of other participants while increasing the robustness of the auction protocol.

[1]  Makoto Yokoo,et al.  Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.

[2]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[3]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[4]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[5]  Masayuki Abe,et al.  M+1-st Price Auction Using Homomorphic Encryption , 2002, Public Key Cryptography.

[6]  Ronald Cramer,et al.  A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..

[7]  Makoto Yokoo,et al.  Secure Generalized Vickrey Auction without Third-party Servers , 2004, Financial Cryptography.

[8]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[9]  Hiroaki Kikuchi,et al.  (M+1)st-Price Auction Protocol , 2002, Financial Cryptography.

[10]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[11]  Josiane Nzouonta,et al.  An Algorithm for Clearing Combinatorial Markets , 2003 .

[12]  Felix Brandt,et al.  How to obtain full privacy in auctions , 2006, International Journal of Information Security.

[13]  Yong Zhao,et al.  Falkon: a Fast and Light-weight tasK executiON framework , 2007, Proceedings of the 2007 ACM/IEEE Conference on Supercomputing (SC '07).

[14]  Tor Helleseth,et al.  Workshop on the theory and application of cryptographic techniques on Advances in cryptology , 1994 .

[15]  David Chaum,et al.  Wallet Databases with Observers , 1992, CRYPTO.

[16]  Aggelos Kiayias,et al.  BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..

[17]  Becky Verastegui,et al.  Proceedings of the 2007 ACM/IEEE conference on Supercomputing , 2007, HiPC 2007.

[18]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[19]  Valtteri Niemi,et al.  Secure Vickrey Auctions without Threshold Trust , 2002, Financial Cryptography.

[20]  Makoto Yokoo,et al.  Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing , 2002, Financial Cryptography.