Secure Second Price Auctions with a Rational Auctioneer

Boaz Catane, Amir Herzberg

Abstract

.

References

  1. Bellare, M., Micciancio, D., and Warinschi, B. (2003). Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In EUROCRYPT, pages 614- 629.
  2. Bellare, M. and Sahai, A. (1999). Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization. In Advances in cryptology-CRYPTO99, pages 78- 78. Springer. http://cseweb.ucsd.edu/~mihir/papers/ nm.pdf.
  3. Boneh, D. and Naor, M. (2000). Timed commitments. In CRYPTO, pages 236-254.
  4. Brandt, F. (2006). How to obtain full privacy in auctions. International Journal of Information Security, 5(4):201-216.
  5. Dolev, D., Dwork, C., and Naor, M. (1991). Non-malleable cryptography. In Proceedings of the twenty-third annual ACM symposium on Theory of computing, pages 542-552. ACM.
  6. Engelbrecht-Wiggans, R. (1980). Auctions and bidding models: A survey. Management Science, pages 119- 142.
  7. Goldwasser, S. and Micali, S. (1982). Probabilistic encryption & how to play mental poker keeping secret all partial information. In Proceedings of the fourteenth annual ACM symposium on Theory of computing, pages 365-377. ACM New York, NY, USA.
  8. Goldwasser, S. and Micali, S. (1984). Probabilistic encryption. Journal of computer and system sciences, 28(2):270-299.
  9. Harkavy, M., Tygar, J., and Kikuchi, H. (1998). Electronic auctions with private bids. In Proceedings of the 3rd USENIX Workshop on Electronic Commerce, volume 31.
  10. Klemperer, P. (2004). Auctions: theory and practice.
  11. Lipmaa, H., Asokan, N., and Niemi, V. (2003). Secure vickrey auctions without threshold trust. In Financial Cryptography, pages 87-101. Springer.
  12. Milgrom, P. and Weber, R. (1982). A theory of auctions and competitive bidding. Econometrica: Journal of the Econometric Society, pages 1089-1122.
  13. Naor, M., Pinkas, B., and Sumner, R. (1999). Privacy preserving auctions and mechanism design. In Proceedings of the 1st ACM conference on Electronic commerce, pages 129-139. ACM.
  14. Parkes, D., Rabin, M., Shieber, S., and Thorpe, C. (2008). Practical secrecy-preserving, verifiably correct and trustworthy auctions. Electronic Commerce Research and Applications, 7(3):294-312.
  15. Pass, R., Vaikuntanathan, V., et al. (2006). Construction of a non-malleable encryption scheme from any semantically secure one. In Advances in Cryptology-CRYPTO 2006, pages 271-289. Springer.
  16. Rabin, M. and Thorpe, C. (2006). Time-lapse cryptography.
  17. Rivest, R., Shamir, A., and Wagner, D. (1996). Time-lock puzzles and timed-release crypto.
  18. Vickrey, W. (1961). Counterspeculation, auctions, and competitive sealed tenders. The Journal of finance, 16(1):8-37.
Download


Paper Citation


in Harvard Style

Catane B. and Herzberg A. (2013). Secure Second Price Auctions with a Rational Auctioneer . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 158-169. DOI: 10.5220/0004526101580169


in Bibtex Style

@conference{secrypt13,
author={Boaz Catane and Amir Herzberg},
title={Secure Second Price Auctions with a Rational Auctioneer},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={158-169},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004526101580169},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Secure Second Price Auctions with a Rational Auctioneer
SN - 978-989-8565-73-0
AU - Catane B.
AU - Herzberg A.
PY - 2013
SP - 158
EP - 169
DO - 10.5220/0004526101580169