메뉴 건너뛰기




Volumn 2742, Issue , 2003, Pages 223-238

Fully private auctions in a constant number of rounds

Author keywords

[No Author keywords available]

Indexed keywords

COSTS;

EID: 35248842111     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45126-6_16     Document Type: Article
Times cited : (49)

References (41)
  • 1
    • 84980096808 scopus 로고
    • Counter speculation, auctions, and competitive sealed tenders
    • Vickrey, W.: Counter speculation, auctions, and competitive sealed tenders. Journal of Finance 16 (1961) 8-37
    • (1961) Journal of Finance , vol.16 , pp. 8-37
    • Vickrey, W.1
  • 3
    • 21844516729 scopus 로고
    • Two models of bid-taker cheating in Vickrey auctions
    • Rothkopf, M., Harstad, R.: Two models of bid-taker cheating in Vickrey auctions. Journal of Business 68 (1995) 257-267
    • (1995) Journal of Business , vol.68 , pp. 257-267
    • Rothkopf, M.1    Harstad, R.2
  • 6
    • 84901711735 scopus 로고    scopus 로고
    • Antisocial agents and Vickrey auctions
    • Meyer, J.J.C., Tambe, M., eds.: Intelligent Agents VIII. Springer Revised papers from the 8th Workshop on Agent Theories, Architectures and Languages
    • Brandt, F., Weiß, G.: Antisocial agents and Vickrey auctions. In Meyer, J.J.C., Tambe, M., eds.: Intelligent Agents VIII. Volume 2333 of Lecture Notes in Artificial Intelligence., Springer (2001) 335-347 Revised papers from the 8th Workshop on Agent Theories, Architectures and Languages.
    • (2001) Lecture Notes in Artificial Intelligence , vol.2333 , pp. 335-347
    • Brandt, F.1    Weiß, G.2
  • 7
    • 84937394850 scopus 로고    scopus 로고
    • Cryptographic protocols for secure second-price auctions
    • Klusch, M., Zambonelli, F., eds.: Cooperative Information Agents V. Springer
    • Brandt, F.: Cryptographic protocols for secure second-price auctions. In Klusch, M., Zambonelli, F., eds.: Cooperative Information Agents V. Volume 2182 of Lecture Notes in Artificial Intelligence., Springer (2001) 154-165
    • (2001) Lecture Notes in Artificial Intelligence , vol.2182 , pp. 154-165
    • Brandt, F.1
  • 8
    • 0032208665 scopus 로고    scopus 로고
    • Flexible double auctions for electronic commerce: Theory and implementation
    • Wurman, P., Walsh, W., Wellman, M.: Flexible double auctions for electronic commerce: Theory and implementation. Decision Support Systems 24 (1998) 17-27
    • (1998) Decision Support Systems , vol.24 , pp. 17-27
    • Wurman, P.1    Walsh, W.2    Wellman, M.3
  • 10
    • 84958964379 scopus 로고    scopus 로고
    • M+1-st price auction using homomorphic encryption
    • Proceedings of the 5th International Conference on Public Key Cryptography (PKC). Springer
    • Abe, M., Suzuki, K.: M+1-st price auction using homomorphic encryption. In: Proceedings of the 5th International Conference on Public Key Cryptography (PKC). Volume 2274 of Lecture Notes in Computer Science., Springer (2002) 115-224
    • (2002) Lecture Notes in Computer Science , vol.2274 , pp. 115-224
    • Abe, M.1    Suzuki, K.2
  • 11
    • 84945256706 scopus 로고    scopus 로고
    • Receipt-free sealed-bid auction
    • Proceedings of the 1st Information Security Conference (ISC).
    • Abe, M., Suzuki, K.: Receipt-free sealed-bid auction. In: Proceedings of the 1st Information Security Conference (ISC). Volume 2433 of Lecture Notes in Computer Science. (2002) 191-199
    • (2002) Lecture Notes in Computer Science , vol.2433 , pp. 191-199
    • Abe, M.1    Suzuki, K.2
  • 16
    • 80555144158 scopus 로고    scopus 로고
    • (M+1)st-price auction protocol
    • Proceedings of the 5th Annual Conference on Financial Cryptography (FC). Springer
    • Kikuchi, H.: (M+1)st-price auction protocol. In: Proceedings of the 5th Annual Conference on Financial Cryptography (FC). Volume 2339 of Lecture Notes in Computer Science., Springer (2001) 351-363
    • (2001) Lecture Notes in Computer Science , vol.2339 , pp. 351-363
    • Kikuchi, H.1
  • 19
    • 0031679773 scopus 로고    scopus 로고
    • Secure electronic sealed-bid auction protocol with public key cryptography
    • Kudo, M.: Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans. Fundamentals E81-A (1998)
    • (1998) IEICE Trans. Fundamentals , vol.E81-A
    • Kudo, M.1
  • 20
    • 84957026937 scopus 로고    scopus 로고
    • Secure Vickrey auctions without threshold trust
    • Blaze, M., ed.: Proceedings of the 6th Annual Conference on Financial Cryptography (FC). Springer
    • Lipmaa, H., Asokan, N., Niemi, V.: Secure Vickrey auctions without threshold trust. In Blaze, M., ed.: Proceedings of the 6th Annual Conference on Financial Cryptography (FC). Volume 2357 of Lecture Notes in Computer Science., Springer (2002)
    • (2002) Lecture Notes in Computer Science , vol.2357
    • Lipmaa, H.1    Asokan, N.2    Niemi, V.3
  • 22
    • 35248870807 scopus 로고    scopus 로고
    • An auction protocol which hides bids of losers
    • Proceedings of the 3rd International Conference on Public Key Cryptography (PKC). Springer
    • Sako, K.: An auction protocol which hides bids of losers. In: Proceedings of the 3rd International Conference on Public Key Cryptography (PKC). Volume 1751 of Lecture Notes in Computer Science., Springer (2000) 422-432
    • (2000) Lecture Notes in Computer Science , vol.1751 , pp. 422-432
    • Sako, K.1
  • 23
    • 0005038557 scopus 로고    scopus 로고
    • A bulletin-board based digital auction scheme with bidding down strategy - Towards anonymous electronic bidding without anonymous channels nor trusted centers
    • Sakurai, K., Miyazaki, S.: A bulletin-board based digital auction scheme with bidding down strategy - towards anonymous electronic bidding without anonymous channels nor trusted centers. In: Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce. (1999) 180-187
    • (1999) Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce , pp. 180-187
    • Sakurai, K.1    Miyazaki, S.2
  • 25
    • 84958975522 scopus 로고    scopus 로고
    • A three phased schema for sealed bid auction system design
    • Proceedings of the Australasian Conference for Information Security and Privacy (ACISP)
    • Viswanathan, K., Boyd, C., Dawson, E.: A three phased schema for sealed bid auction system design. In: Proceedings of the Australasian Conference for Information Security and Privacy (ACISP). Lecture Notes in Computer Science (2000) 412-426
    • (2000) Lecture Notes in Computer Science , pp. 412-426
    • Viswanathan, K.1    Boyd, C.2    Dawson, E.3
  • 27
    • 0010117654 scopus 로고    scopus 로고
    • An anonymous electronic bidding protocol based on a new convertible group signature scheme
    • Proceedings of the 5th Australasian Conference on Information Security and Privacy (ACISP2000)
    • Sakurai, K., Miyazaki, S.: An anonymous electronic bidding protocol based on a new convertible group signature scheme. In: Proceedings of the 5th Australasian Conference on Information Security and Privacy (ACISP2000). Lecture Notes in Computer Science (2000)
    • (2000) Lecture Notes in Computer Science
    • Sakurai, K.1    Miyazaki, S.2
  • 29
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4 (1991) 161-174
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.P.1
  • 30
    • 0002187137 scopus 로고
    • Wallet databases with observers
    • Advances in Cryptology - Proceedings of the 12th Annual International Cryptology Conference (CRYPTO). Springer
    • Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Advances in Cryptology - Proceedings of the 12th Annual International Cryptology Conference (CRYPTO). Volume 740 of Lecture Notes in Computer Science., Springer (1992) 3.1-3.6
    • (1992) Lecture Notes in Computer Science , vol.740
    • Chaum, D.1    Pedersen, T.P.2
  • 31
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Advances in Cryptology - Proceedings of the 14th Annual International Cryptology Conference (CRYPTO). Springer
    • Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Advances in Cryptology - Proceedings of the 14th Annual International Cryptology Conference (CRYPTO). Volume 893 of Lecture Notes in Computer Science., Springer (1994) 174-187
    • (1994) Lecture Notes in Computer Science , vol.893 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 33
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31 (1985) 469-472
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 34
    • 84958979582 scopus 로고    scopus 로고
    • On the security of ElGamal-based encryption
    • Proceedings of the 1st International Workshop on Practice and Theory in Public Key Cryptography (PKC). Springer
    • Tsiounis, Y., Yung, M.: On the security of ElGamal-based encryption. In: Proceedings of the 1st International Workshop on Practice and Theory in Public Key Cryptography (PKC). Volume 1431 of Lecture Notes in Computer Science., Springer (1998) 117-134
    • (1998) Lecture Notes in Computer Science , vol.1431 , pp. 117-134
    • Tsiounis, Y.1    Yung, M.2
  • 35
    • 0242708796 scopus 로고    scopus 로고
    • Social choice and preference protection - Towards fully private mechanism design
    • ACM Press to appear
    • Brandt, F.: Social choice and preference protection - Towards fully private mechanism design. In: Proceedings of the 4th ACM Conference on Electronic Commerce, ACM Press (2003) to appear.
    • (2003) Proceedings of the 4th ACM Conference on Electronic Commerce
    • Brandt, F.1
  • 36
    • 35248880750 scopus 로고    scopus 로고
    • Technical Report FKI-247-03, Department for Computer Science, Technical University of Munich
    • Brandt, F.: Private public choice. Technical Report FKI-247-03, Department for Computer Science, Technical University of Munich (2003)
    • (2003) Private Public Choice
    • Brandt, F.1
  • 37
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • Advances in Cryptology - Proceedings of the 18th Eurocrypt Conference. Springer
    • Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Advances in Cryptology - Proceedings of the 18th Eurocrypt Conference. Volume 2045 of Lecture Notes in Computer Science., Springer (2001)
    • (2001) Lecture Notes in Computer Science , vol.2045
    • Cramer, R.1    Damgård, I.2    Nielsen, J.B.3
  • 38
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Advances in Cryptology - Proceedings of the 16th Eurocrypt Conference. Springer
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology - Proceedings of the 16th Eurocrypt Conference. Volume 1592 of Lecture Notes in Computer Science., Springer (1999) 223-238
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 39
    • 84937431456 scopus 로고    scopus 로고
    • Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
    • Advances in Cryptology - Proceedings of the 22th Annual International Cryptology Conference (CRYPTO). Springer
    • Algesheimer, J., Camenisch, J., Shoup, V.: Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. In: Advances in Cryptology - Proceedings of the 22th Annual International Cryptology Conference (CRYPTO). Volume 2442 of Lecture Notes in Computer Science., Springer (2002) 417-432
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 417-432
    • Algesheimer, J.1    Camenisch, J.2    Shoup, V.3
  • 41
    • 84945127249 scopus 로고    scopus 로고
    • Practical threshold RSA signatures without a trusted dealer
    • Advances in Cryptology - Proceedings of the 18th Eurocrypt Conference. Springer
    • Damgård, I., Koprowski, M.: Practical threshold RSA signatures without a trusted dealer. In: Advances in Cryptology - Proceedings of the 18th Eurocrypt Conference. Volume 2045 of Lecture Notes in Computer Science., Springer (2001) 152-165
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 152-165
    • Damgård, I.1    Koprowski, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.