loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Sriram Krishnamachari 1 ; Mehrdad Nojoumian 1 and Kemal Akkaya 2

Affiliations: 1 Southern Illinois University, United States ; 2 Florida International University, United States

Keyword(s): Privacy-preserving Auction, Sealed-bid Auction, Unconditional Security, Computational Security.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Privacy Enhancing Technologies

Abstract: Designing a sealed-bid auction protocol is a challenging problem in the field of applied cryptography. In the last couple of decades, numerous protocols have been proposed in the literature where each one has its own property in terms of the security model, communication and computation complexities. To the best of our knowledge, there has been no study to implement and compare a similar class of sealed-bid auction protocols. This paper therefore implements and evaluates five different Dutch-style sealed-bid auction protocols, of which three protocols are computationally secure and two protocols are unconditionally secure. It mainly focuses on the computational cost of the initialization and verification phases of these privacy-preserving protocols.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.191.200.223

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Krishnamachari, S.; Nojoumian, M. and Akkaya, K. (2015). Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security. In Proceedings of the 1st International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-081-9; ISSN 2184-4356, SciTePress, pages 106-113. DOI: 10.5220/0005258501060113

@conference{icissp15,
author={Sriram Krishnamachari. and Mehrdad Nojoumian. and Kemal Akkaya.},
title={Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security},
booktitle={Proceedings of the 1st International Conference on Information Systems Security and Privacy - ICISSP},
year={2015},
pages={106-113},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005258501060113},
isbn={978-989-758-081-9},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 1st International Conference on Information Systems Security and Privacy - ICISSP
TI - Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security
SN - 978-989-758-081-9
IS - 2184-4356
AU - Krishnamachari, S.
AU - Nojoumian, M.
AU - Akkaya, K.
PY - 2015
SP - 106
EP - 113
DO - 10.5220/0005258501060113
PB - SciTePress