bid they have submitted. There are several different
approaches to satisfy this requirement. For example,
auction protocols which utilise secure computation
for winner determination (e.g., (Kikuchi et al., 1998;
Harkavy et al., 1998) provide this facility by conceal-
ing the identity of bidders in their bids). A common
solution is to issue bidders with a pseudonym (during
registration), which they can use to submit bids. That
is, bidders register themselves (by presenting verified
identification) and obtain a pseudonym.
Seemingly the technique of issuing pseudonyms
requires having more than one server/party on the
auction side. Otherwise, the same party issuing
the pseudonym knows the real identity of the asso-
ciated bidder, and thus learns the relationship be-
tween the bids and the bidders. On the contrary, if
the pseudonym issuer does not know the pseudonym
(e.g., it is issued by blindly signing a message), then it
cannot retrieve the real identity of a bidder in the case
of a dispute. This model essentially works as follows
(assume the two servers/parties are called S
1
and S
2
):
1. Bidders present their identification to S
1
and obtain
a token that does not carry their ID.
2. Bidders submit the token (without revealing their
ID) to S
2
, who issues a pseudonym associated with
the token.
In this way, neither S
1
nor S
2
knows the relation-
ship between any real ID and the pseudonyms. The
bidder then submits his/her bid using the pseudonym.
However, in the event of a dispute S
1
and S
2
can co-
operate to determine the real ID associated with each
pseudonym.
Our observation is that, regardless of how se-
cure the anonymity issuing protocol is, the resulting
scheme is not secure if there is no separation between
the registration and the bidding phases. That is, the
registration must be performed for all bidders prior to
the commencement of bidding and the system must
not accept any bid before the registration is closed.
The following scenario explains a possible attack: A
bidder provides identification to S
1
and obtains a to-
ken. Using this token, it obtains a pseudonym which
can be used for bidding. If there is no separation
between the registration and bidding phases S
1
can
act in a procrastinating manner by halting all future
registrations until the newly registered bidder sub-
mits his/her bid. This scenario enables S
1
to learn
the mapping between the bidder’s identity and his/her
pseudonym. To protect against this type of attack, the
scheme should not allow any bidding prior to the reg-
istration closing time.
Note that there are electronic auction schemes in
which it is impossible to have a separation between
the registration and the bidding phases. For example,
a CDA allows bidders to continuously submit bids at
the same time new bidders are being registered (i.e.,
the registration and bidding phases overlap). There-
fore the scheme by Wang and Leung (Wang and Le-
ung, 2004) can be broken using this procrastinating
attack.
4.3 Bid Authentication Issues
Efficient winner determination is an important crite-
ria in the evaluation of electronic auction protocols.
Because of its importance, many schemes provide ev-
idence to support their claims regarding the ability of
their system to efficiently process bids. For example,
(Franklin and Reiter, 1996) in their highly referenced
work, claim that:
“We have implemented a prototype of our ser-
vice to demonstrate its feasibility. The perfor-
mance of this implementation indicates that our
approach is feasible using off-the-shelf worksta-
tions for auction servers, even for large auctions
involving hundreds of bids.”
The question is, what will happen if a (set of) ma-
licious bidder(s) issues too many bids? Optimisti-
cally assuming that processing each bid takes only
one second, then the winner determination process
will require a proportional amount of time (i.e., the
system is not practical). The problem is more crucial
in schemes which use secure computation (see, e.g.,
(Kikuchi et al., 1998)). They achieve anonymity by
concealing the identity of bidders in their bids. In ad-
dition, all bids are submitted anonymously. The win-
ner determination protocol opens only one bid –a bid
that contains the highest offer. If there is a tie (i.e.,
more than one bid at the highest offer), then another
round of bidding must occur. A malicious bidder can
easily cause a never ending scenario in this scheme.
For example, even if all high valued bids are opened
(which is disallowed by the protocol), the Auctioneer
cannot determine who has submitted the bid as it con-
tains a false identity. Obviously, such schemes are not
practical at all.
This problem can be avoided if the bids have
been authenticated. That is, the Auctioneer accepts
bids only from registered bidders (generally, in
all sealed-bid auctions, each bidder submits only
one bid). If the system supports anonymity of the
bidders, then it must also provide the authentication
of the corresponding pseudonym. Note that there
are schemes which check the validity of the bids
(i.e., they check whether the submitted bid satisfies
a predetermined structure). This is insufficient,
as one may submit too many well-structured bids.
Furthermore, bid authentication must be secure about
relevant attacks. In order to illustrate the problem,
let us examine the protocol by (Boyd et al., 2000),
which supports a sealed bid auction system. This
is possibly the only auction scheme which uses bid
DESIGN ISSUES FOR ELECTRONIC AUCTIONS
343