An efficient eAuction potocol

Curtis, Brian, , & Seruga, Jan (2007) An efficient eAuction potocol. In Revell, N & Wagner, R (Eds.) Proceedings of the Second International Conference on Availability, Reliability and Security. Institute of Electrical and Electronics Engineers Inc., United States of America, pp. 417-421.

View at publisher

Description

A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions

Impact and interest:

8 citations in Scopus
Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

ID Code: 73403
Item Type: Chapter in Book, Report or Conference volume (Conference contribution)
ORCID iD:
Pieprzyk, Joseforcid.org/0000-0002-1917-6466
Measurements or Duration: 5 pages
Event Title: 2nd International Conference on Availability, Reliability and Security (ARES 2007)
Event Dates: 2007-04-10 - 2007-04-13
Event Location: UNSPECIFIED
Keywords: cryptographic protocols, data privacy, electronic commerce, public key cryptography
DOI: 10.1109/ARES.2007.37
ISBN: 0769527752
Pure ID: 33696970
Divisions: Past > QUT Faculties & Divisions > Science & Engineering Faculty
Copyright Owner: Consult author(s) regarding copyright matters
Copyright Statement: This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the document is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recognise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to qut.copyright@qut.edu.au
Deposited On: 07 Jul 2014 10:10
Last Modified: 26 Oct 2025 18:45