Skip to main content
Erschienen in: The Journal of Supercomputing 8/2018

12.04.2017

Toward a fair indictment for sealed-bid auction with self-enforcing privacy

verfasst von: Kok-Seng Wong, Myung Ho Kim

Erschienen in: The Journal of Supercomputing | Ausgabe 8/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In a sealed-bid auction, bidders simultaneously submit their sealed bids to the auctioneer without knowledge of the others’ bids. The auctioneer will then declare the bidder with the highest price (or second-highest price) as the winner during the opening stage. Although existing bidding solutions focus on ensuring certain characteristics of the auction, including correctness, fairness, privacy protection, and confidentiality, it is difficult for losing bidders to verify whether the winner is a genuine bidder or just a fake bidder that is manipulated by a malicious party (e.g., a malicious auctioneer). In this paper, we introduce a fair indictment mechanism for an online sealed-bid auction that includes self-enforcing privacy. Our solution allows for an honest bidder to detect malicious activity and provides the bidder with verifiable evidence to indict a dishonest party. A successful indictment will give an incentive to the honest bidder and will result in a withdrawal of the result of the auction, whereas a failed indictment will require the involved complainer to pay a penalty. We achieve this goal using a scheme designed with an oblivious polynomial evaluation and homomorphic cryptosystem. We also involve a semi-honest verification agent in the indictment process to help the honest party verify the winning bid. This prevents the auctioneer from controlling the entire auction process. We also provide an analysis of the indictment, requirements, security and efficiency of the proposed mechanism and demonstrate the use of our solution in a multiple-item sealed-bid auction (i.e., combinatorial auction).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
2.
4.
Zurück zum Zitat Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Paper presented at the Proceedings of the 13th Conference on USENIX Security Symposium, vol 13, San Diego, CA Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Paper presented at the Proceedings of the 13th Conference on USENIX Security Symposium, vol 13, San Diego, CA
7.
Zurück zum Zitat NIST cloud computing standards roadmap, NIST CCSRWG-092 (2011) NIST. Gaithersburg, MD, USA NIST cloud computing standards roadmap, NIST CCSRWG-092 (2011) NIST. Gaithersburg, MD, USA
8.
Zurück zum Zitat Park J, Spetka E, Rasheed H, Ratazzi P, Han K (2012) Near-real-time cloud auditing for rapid response. In: 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE Computer Society, Washington, DC, USA Park J, Spetka E, Rasheed H, Ratazzi P, Han K (2012) Near-real-time cloud auditing for rapid response. In: 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE Computer Society, Washington, DC, USA
10.
Zurück zum Zitat Reveilhac M, Pasquet M (2009) Promising secure element alternatives for NFC technology. In: First international workshop on near field communication, 2009. NFC’09. IEEE, pp 75–80 Reveilhac M, Pasquet M (2009) Promising secure element alternatives for NFC technology. In: First international workshop on near field communication, 2009. NFC’09. IEEE, pp 75–80
13.
Zurück zum Zitat Mayer R, Davis J, Schoorman F (1995) An integrative model of organizational trust: past, present, and future. Acad Manag Rev 20(3):709–734CrossRef Mayer R, Davis J, Schoorman F (1995) An integrative model of organizational trust: past, present, and future. Acad Manag Rev 20(3):709–734CrossRef
14.
Zurück zum Zitat Pawar PS, Rajarajan M, Nair SK, Zisman A (2012) Trust model for optimized cloud services. Springer, BerlinCrossRef Pawar PS, Rajarajan M, Nair SK, Zisman A (2012) Trust model for optimized cloud services. Springer, BerlinCrossRef
15.
Zurück zum Zitat Gartner, (2013) Gartner says personal worlds and the internet of everything are colliding to create new markets. Gartner Newsroom, Barcelona, Spain Gartner, (2013) Gartner says personal worlds and the internet of everything are colliding to create new markets. Gartner Newsroom, Barcelona, Spain
16.
Zurück zum Zitat Haq IU, Alnemr R, Paschke A, Schikuta E, Boley H, Meinel C (2010) Distributed trust management for validating sla choreographies. In: Wieder P, Yahyapour R, Ziegler W (eds) Grids and service-oriented architectures for service level agreements. Springer, Boston, MA Haq IU, Alnemr R, Paschke A, Schikuta E, Boley H, Meinel C (2010) Distributed trust management for validating sla choreographies. In: Wieder P, Yahyapour R, Ziegler W (eds) Grids and service-oriented architectures for service level agreements. Springer, Boston, MA
17.
Zurück zum Zitat Abawajy J (2011) Establishing trust in hybrid cloud computing environments. In: Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE Computer Society, Washington, DC, USA Abawajy J (2011) Establishing trust in hybrid cloud computing environments. In: Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE Computer Society, Washington, DC, USA
19.
Zurück zum Zitat Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. Paper presented at the Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, Prague, Czech Republic Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. Paper presented at the Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, Prague, Czech Republic
20.
Zurück zum Zitat Canetti R (2001) Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings of 42nd IEEE Symposium on Foundations of Computer Science, 2001, 8–11 October 2001, pp 136–145. doi:10.1109/sfcs.2001.959888 Canetti R (2001) Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings of 42nd IEEE Symposium on Foundations of Computer Science, 2001, 8–11 October 2001, pp 136–145. doi:10.​1109/​sfcs.​2001.​959888
Metadaten
Titel
Toward a fair indictment for sealed-bid auction with self-enforcing privacy
verfasst von
Kok-Seng Wong
Myung Ho Kim
Publikationsdatum
12.04.2017
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 8/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-017-2045-3

Weitere Artikel der Ausgabe 8/2018

The Journal of Supercomputing 8/2018 Zur Ausgabe