메뉴 건너뛰기




Volumn , Issue , 2006, Pages 70-81

Practical secrecy-preserving, verifiably correct and trustworthy auctions

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTING NETWORKS; ENCRYPTED BIDS; TRUSTWORTHY AUCTIONS;

EID: 34547358748     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1151454.1151478     Document Type: Conference Paper
Times cited : (20)

References (37)
  • 4
    • 34547263132 scopus 로고    scopus 로고
    • Protocol completion incentive problems in cryptographic Vickrey auctions
    • 3-2004, Rutgers Center for Operations Research RUTCOR
    • P. G. Bradford, S. Park, and M. H. Rothkopf. Protocol completion incentive problems in cryptographic Vickrey auctions. Technical Report RRR 3-2004, Rutgers Center for Operations Research (RUTCOR), 2004.
    • (2004) Technical Report RRR
    • Bradford, P.G.1    Park, S.2    Rothkopf, M.H.3
  • 5
    • 34547302997 scopus 로고    scopus 로고
    • How to obtain full privacy in auctions
    • Technical report, Carnegie Mellon University
    • F. Brandt. How to obtain full privacy in auctions. Technical report, Carnegie Mellon University, 2005.
    • (2005)
    • Brandt, F.1
  • 8
    • 0002908662 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
    • I. Damgård and M. Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In Proc. Public Key Cryptography 01, 2001.
    • (2001) Proc. Public Key Cryptography 01
    • Damgård, I.1    Jurik, M.2
  • 9
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Information Theory, IT-31(4):469-472, 1985.
    • (1985) IEEE Trans. Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 17
    • 70450129942 scopus 로고    scopus 로고
    • LiDIA - a library for computational number theory
    • LiDIA-Group
    • LiDIA-Group. LiDIA - a library for computational number theory. TU Darmstadt, 2001.
    • (2001) TU Darmstadt
  • 19
    • 0040952956 scopus 로고    scopus 로고
    • Vickrey auctions in practice: From nineteenth century philately to twenty-first century e-commerce
    • D. Lucking-Reiley. Vickrey auctions in practice: From nineteenth century philately to twenty-first century e-commerce. J. of Economic Perspectives, 14:182-192, 2000.
    • (2000) J. of Economic Perspectives , vol.14 , pp. 182-192
    • Lucking-Reiley, D.1
  • 23
    • 33746911297 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, FIPS PUB
    • National Institute of Standards and Technology. Secure hash signature standard. http://carc.nist.gov/publications/fips/fips180-2/fips180- 2withchangenotice.pdf, 2002. FIPS PUB 180-2.
    • (2002) Secure hash signature standard , pp. 180-182
  • 25
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite residuosity classes. In Proc. EUROCRYPT '99, pages 223-239, 1999.
    • (1999) Proc. EUROCRYPT '99 , pp. 223-239
    • Paillier, P.1
  • 26
    • 0010277907 scopus 로고
    • Digitalized signatures
    • Academic Press, New York
    • M. O. Rabin. Digitalized signatures. In Foundations of Secure Computing, pages 155-166. Academic Press, New York, 1978.
    • (1978) Foundations of Secure Computing , pp. 155-166
    • Rabin, M.O.1
  • 27
    • 34547330606 scopus 로고    scopus 로고
    • M. O. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science, 1979.
    • M. O. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science, 1979.
  • 29
    • 34547340716 scopus 로고    scopus 로고
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report MIT/LCS/TM-82, MIT Laboratory for Computer Science, 1977.
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report MIT/LCS/TM-82, MIT Laboratory for Computer Science, 1977.
  • 30
    • 0010602889 scopus 로고    scopus 로고
    • Time-lock puzzles and timed release crypto
    • Technical Report MIT/LCS/TR-684, MIT, 1996
    • R. L. Rivest, A. Shamir, and D. A. Wagner. Time-lock puzzles and timed release crypto. Technical Report MIT/LCS/TR-684, MIT, 1996.
    • Rivest, R.L.1    Shamir, A.2    Wagner, D.A.3
  • 32
    • 33750696788 scopus 로고    scopus 로고
    • Changing the game in strategic sourcing at Procter & Gamble: Expressive competition enabled by optimization
    • T. Sandholm, D. Levine, M. Concordia, P. Martyn, R. Hughes, J. Jacobes, and D. Begg. Changing the game in strategic sourcing at Procter & Gamble: Expressive competition enabled by optimization. Interfaces, 36(1):55-68, 2006.
    • (2006) Interfaces , vol.36 , Issue.1 , pp. 55-68
    • Sandholm, T.1    Levine, D.2    Concordia, M.3    Martyn, P.4    Hughes, R.5    Jacobes, J.6    Begg, D.7
  • 35
    • 26444446019 scopus 로고    scopus 로고
    • Secure generalized Vickrey auction using homomorphic encryption
    • K. Suzuki and M. Yokoo. Secure generalized Vickrey auction using homomorphic encryption. In Proc. Financial Cryptography, 2003.
    • (2003) Proc. Financial Cryptography
    • Suzuki, K.1    Yokoo, M.2
  • 36
    • 34547376855 scopus 로고    scopus 로고
    • Receipt-free electronic auction schemes using homomorphic encryption
    • B. L. Xiaofeng Chen, Kwangjo Kim. Receipt-free electronic auction schemes using homomorphic encryption. In ICISC, 2003.
    • (2003) ICISC
    • Xiaofeng Chen, B.L.1    Kim, K.2
  • 37
    • 0036367593 scopus 로고    scopus 로고
    • Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions
    • M. Yokoo and K. Suzuki. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions. In Proc. First Int. Conf. on Autonomous Agents and Multiagent Systems, 2002.
    • (2002) Proc. First Int. Conf. on Autonomous Agents and Multiagent Systems
    • Yokoo, M.1    Suzuki, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.