메뉴 건너뛰기




Volumn 4107 LNCS, Issue , 2006, Pages 142-147

A practical implementation of secure auctions based on multiparty integer computation

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; INTEGER PROGRAMMING; KNOWLEDGE BASED SYSTEMS; PROBLEM SOLVING;

EID: 33750056675     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11889663_10     Document Type: Conference Paper
Times cited : (84)

References (21)
  • 1
    • 84937431456 scopus 로고    scopus 로고
    • Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
    • (Berlin), M. Yung, Ed., Springer-Verlag
    • ALGESHEIMER, J., CAMENISCH, J., AND SHOUP, V. Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In Advances in Cryptology - CRYPTO 2002 (Berlin, 2002), M. Yung, Ed., Springer-Verlag, pp. 417-432.
    • (2002) Advances in Cryptology - CRYPTO 2002 , pp. 417-432
    • Algesheimer, J.1    Camenisch, J.2    Shoup, V.3
  • 2
    • 84941163009 scopus 로고    scopus 로고
    • BOGETOFT, P., AND NIELSEN, K. Work in progress. 2005
    • BOGETOFT, P., AND NIELSEN, K. Work in progress. 2005.
  • 3
    • 84937394850 scopus 로고    scopus 로고
    • Cryptographic protocols for secure second-price auctions
    • 154-
    • BRANDT, F. Cryptographic protocols for secure second-price auctions. Lecture Notes in Computer Science 2182 (2001), 154-
    • (2001) Lecture Notes in Computer Science , vol.2182
    • Brandt, F.1
  • 7
    • 84941159989 scopus 로고    scopus 로고
    • DAMGÅRD, L, AND TOFT, T. Work in progress. 2005
    • DAMGÅRD, L, AND TOFT, T. Work in progress. 2005.
  • 10
    • 0029220609 scopus 로고
    • The design and implementation of a secure auction service
    • (Oakland, Ca), IEEE Computer Society Press
    • FRANKLIN, M., AND REITER, M. The Design and Implementation of a Secure Auction Service. In Proc. IEEE Symp. on Security and Privacy (Oakland, Ca, 1995), IEEE Computer Society Press, pp. 2-14.
    • (1995) Proc. IEEE Symp. on Security and Privacy , pp. 2-14
    • Franklin, M.1    Reiter, M.2
  • 11
    • 33750064649 scopus 로고    scopus 로고
    • Master's thesis, Department of Computer Science, University of Aarhus. In preparation
    • FROM, S. L., AND JAKOBSEN, T. Secure Multi-Party Computation on Integers. Master's thesis, Department of Computer Science, University of Aarhus, 2006. In preparation.
    • (2006) Secure Multi-party Computation on Integers
    • From, S.L.1    Jakobsen, T.2
  • 12
    • 0023545076 scopus 로고
    • How to play any mental gamer or a completeness theorem for protocols with honest majority
    • ACM
    • GOLDREICH, O., MICALI, S., AND WIGDERSON, A. How to play any mental gamer or a completeness theorem for protocols with honest majority. In 19th Symp. on Theory of Computing (STOC) (1987), ACM, pp. 218-229.
    • (1987) 19th Symp. on Theory of Computing (STOC) , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 14
    • 0032804976 scopus 로고    scopus 로고
    • Auction theory: A guide to the literature
    • KLEMPERER, P. Auction theory: A guide to the literature. Journal of Economic Survey 13, 3 (1999), 227-286.
    • (1999) Journal of Economic Survey , vol.13 , Issue.3 , pp. 227-286
    • Klemperer, P.1
  • 15
    • 84957026937 scopus 로고    scopus 로고
    • Secure vickrey auctions without threshold trust
    • Financial Cryptography 2002
    • LIPMAA, H., ASOKAN, N., AND NIEMI, V. Secure vickrey auctions without threshold trust. In Financial Cryptography 2002 (2002), vol. 2357 of Lecture Notes in Computer Science.
    • (2002) Lecture Notes in Computer Science , vol.2357
    • Lipmaa, H.1    Asokan, N.2    Niemi, V.3
  • 18
    • 21844488096 scopus 로고
    • Optimal bidding in multi-unit auctions with many bidders
    • NAUTZ, D. Optimal bidding in multi-unit auctions with many bidders. Economics Letters 48 (1995), 301-306.
    • (1995) Economics Letters , vol.48 , pp. 301-306
    • Nautz, D.1
  • 19
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • SHAMIR, A. How to share a secret. Communications of the ACM 22, 11 (November 1979), 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 20
    • 33750087380 scopus 로고    scopus 로고
    • Secure integer computation with application in economics
    • available from author, tomas@daimi.au.dk
    • T.TOFT. Secure integer computation with application in economics. Progress Report, available from author, tomas@daimi.au.dk (2005).
    • (2005) Progress Report
    • Toft, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.