메뉴 건너뛰기




Volumn 7, Issue 3, 2008, Pages 294-312

Practical secrecy-preserving, verifiably correct and trustworthy auctions

Author keywords

Auction theory; Auctions; Cryptographic auctions; Cryptography; E commerce; Electronic transactions; Homomorphic cryptography; Security

Indexed keywords

CANNING; CRYPTOGRAPHY; INDUSTRIAL ECONOMICS; SOFTWARE PROTOTYPING;

EID: 52049124778     PISSN: 15674223     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.elerap.2008.04.006     Document Type: Article
Times cited : (53)

References (80)
  • 1
    • 52049106923 scopus 로고    scopus 로고
    • M. Abe, K. Suzuki, M + 1-st price auction using homomorphic encryption, in: Proceedings of Public Key Cryptography, 2002.
    • M. Abe, K. Suzuki, M + 1-st price auction using homomorphic encryption, in: Proceedings of Public Key Cryptography, 2002.
  • 2
    • 21844513129 scopus 로고
    • Corruption in the North Sea oil industry: issues and assessments
    • Andvig J.C. Corruption in the North Sea oil industry: issues and assessments. Crime, Law & Social Change 23 4 (1995) 289-313
    • (1995) Crime, Law & Social Change , vol.23 , Issue.4 , pp. 289-313
    • Andvig, J.C.1
  • 3
    • 52049114485 scopus 로고    scopus 로고
    • L. Arozamena, F. Weinschelbaum, The effect of corruption on bidding behavior in first-price auctions, Technical Report, Universidad de San Andres, 2004.
    • L. Arozamena, F. Weinschelbaum, The effect of corruption on bidding behavior in first-price auctions, Technical Report, Universidad de San Andres, 2004.
  • 5
    • 52049116371 scopus 로고    scopus 로고
    • J. Asker, E. Cantillon, Properties of scoring auctions, Technical report, Leonard N. Stern School of Business, 2006.
    • J. Asker, E. Cantillon, Properties of scoring auctions, Technical report, Leonard N. Stern School of Business, 2006.
  • 7
    • 52049120202 scopus 로고    scopus 로고
    • O. Baudron, J. Stern, Non-interactive private auctions, in: Proceedings Financial Cryptography, 2001.
    • O. Baudron, J. Stern, Non-interactive private auctions, in: Proceedings Financial Cryptography, 2001.
  • 9
    • 84948973732 scopus 로고    scopus 로고
    • F. Boudot, Efficient proofs that a committed number lies in an interval, in: Proceedings of Eurocrypt 2000, vol. LNCS 1807, Springer, 2000, p. 431.
    • F. Boudot, Efficient proofs that a committed number lies in an interval, in: Proceedings of Eurocrypt 2000, vol. LNCS 1807, Springer, 2000, p. 431.
  • 10
    • 52049107667 scopus 로고    scopus 로고
    • P.G. Bradford, S. Park, M.H. Rothkopf, Protocol completion incentive problems in cryptographic Vickrey auctions, Technical Report RRR 3-2004, Rutgers Center for Operations Research (RUTCOR), 2004.
    • P.G. Bradford, S. Park, M.H. Rothkopf, Protocol completion incentive problems in cryptographic Vickrey auctions, Technical Report RRR 3-2004, Rutgers Center for Operations Research (RUTCOR), 2004.
  • 11
    • 52049090415 scopus 로고    scopus 로고
    • F. Brandt, How to obtain full privacy in auctions, Technical Report, Carnegie Mellon University, 2005.
    • F. Brandt, How to obtain full privacy in auctions, Technical Report, Carnegie Mellon University, 2005.
  • 12
    • 4544319920 scopus 로고    scopus 로고
    • F. Brandt, T. Sandholm, (Im)possibility of unconditionally privacy-preserving auctions, in: Proceedings of the Third International Conference on Autonomous Agents and Multi- Agent Systems, 2004, pp. 810-817.
    • F. Brandt, T. Sandholm, (Im)possibility of unconditionally privacy-preserving auctions, in: Proceedings of the Third International Conference on Autonomous Agents and Multi- Agent Systems, 2004, pp. 810-817.
  • 13
    • 84949198248 scopus 로고    scopus 로고
    • E. Brickell, D. Chaum, I. Damgård, J. Van de Graaf, Gradual and verifiable release of a secret, in: Proceedings of CRYPTO'87, LNCS, vol. 293, 1988, pp. 156-166.
    • E. Brickell, D. Chaum, I. Damgård, J. Van de Graaf, Gradual and verifiable release of a secret, in: Proceedings of CRYPTO'87, LNCS, vol. 293, 1988, pp. 156-166.
  • 15
    • 52049117465 scopus 로고    scopus 로고
    • R. Burguet, M. Perry, Bribery and favoritism by auctioneers in sealed-bid auctions, Technical Report, Institute of Economic Analysis, UAB, Barcelona, 2003.
    • R. Burguet, M. Perry, Bribery and favoritism by auctioneers in sealed-bid auctions, Technical Report, Institute of Economic Analysis, UAB, Barcelona, 2003.
  • 17
    • 0033280866 scopus 로고    scopus 로고
    • C. Cachin, Efficient private bidding and auctions with an oblivious third party, in: Proceedings of the Sixth ACM Conference on Computer and Comm. Security, 1999, pp. 120-127.
    • C. Cachin, Efficient private bidding and auctions with an oblivious third party, in: Proceedings of the Sixth ACM Conference on Computer and Comm. Security, 1999, pp. 120-127.
  • 18
    • 0036302790 scopus 로고    scopus 로고
    • Corruption and competition in procurement
    • Celantani M., and Ganuza J.J. Corruption and competition in procurement. European Economic Review 46 7 (2002) 1273-1303
    • (2002) European Economic Review , vol.46 , Issue.7 , pp. 1273-1303
    • Celantani, M.1    Ganuza, J.J.2
  • 19
    • 84957661460 scopus 로고    scopus 로고
    • A. Chan, Y. Frankel, Y. Tsiounis, Easy come - easy go divisible cash, in: Proceedings of EUROCRYPT'98, LNCS, vol. 1403, 1998, pp. 561-575.
    • A. Chan, Y. Frankel, Y. Tsiounis, Easy come - easy go divisible cash, in: Proceedings of EUROCRYPT'98, LNCS, vol. 1403, 1998, pp. 561-575.
  • 20
    • 52049090646 scopus 로고    scopus 로고
    • X. Chen, K. Kim, B. Lee, Receipt-free electronic auction schemes using homomorphic encryption, in: ICISC, 2003.
    • X. Chen, K. Kim, B. Lee, Receipt-free electronic auction schemes using homomorphic encryption, in: ICISC, 2003.
  • 22
    • 52049102494 scopus 로고    scopus 로고
    • I. Damgård, M. Jurik, A generalisation, a simplification and some applications of Paillier's probabilistic public-key system, in: Proceedings of Public Key Cryptography 01, 2001.
    • I. Damgård, M. Jurik, A generalisation, a simplification and some applications of Paillier's probabilistic public-key system, in: Proceedings of Public Key Cryptography 01, 2001.
  • 23
  • 24
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Information Theory IT-31 4 (1985) 469-472
    • (1985) IEEE Trans. Information Theory IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 27
    • 52049102311 scopus 로고    scopus 로고
    • D. Giry, P. Bulens, Cryptographic key length recommendation. (accessed 13.04.08).
    • D. Giry, P. Bulens, Cryptographic key length recommendation. (accessed 13.04.08).
  • 28
    • 84935948750 scopus 로고
    • Collusive bidder behavior at single-object second price and english auctions
    • Graham D.A., and Marshall R.C. Collusive bidder behavior at single-object second price and english auctions. Journal of Political Economy 95 6 (1987) 1217-1239
    • (1987) Journal of Political Economy , vol.95 , Issue.6 , pp. 1217-1239
    • Graham, D.A.1    Marshall, R.C.2
  • 29
    • 85094835061 scopus 로고    scopus 로고
    • M. Harkavy, J.D. Tygar, H. Kikuchi, Electronic auctions with private bids, in: Proceedings of the Third USENIX Workshop on Electronic Commerce, 1998, pp. 61-74.
    • M. Harkavy, J.D. Tygar, H. Kikuchi, Electronic auctions with private bids, in: Proceedings of the Third USENIX Workshop on Electronic Commerce, 1998, pp. 61-74.
  • 30
    • 52049093038 scopus 로고    scopus 로고
    • A test for collusion between a bidder and an auctioneer in sealed-bid auctions
    • Ingraham A.T. A test for collusion between a bidder and an auctioneer in sealed-bid auctions. Contributions to Economic Analysis and Policy 4 1 (2005) 1-32
    • (2005) Contributions to Economic Analysis and Policy , vol.4 , Issue.1 , pp. 1-32
    • Ingraham, A.T.1
  • 32
    • 52049098981 scopus 로고    scopus 로고
    • M.J. Jurik, Extensions to the paillier cryptosystem with applications to cryptological protocols, Ph.D. Thesis, University of Århus, 2003.
    • M.J. Jurik, Extensions to the paillier cryptosystem with applications to cryptological protocols, Ph.D. Thesis, University of Århus, 2003.
  • 33
    • 52049103417 scopus 로고    scopus 로고
    • H. Kikuchi, (m + 1)st price auction protocol, in: Proceedings of Financial Cryptography, 2001.
    • H. Kikuchi, (m + 1)st price auction protocol, in: Proceedings of Financial Cryptography, 2001.
  • 34
    • 52049126871 scopus 로고    scopus 로고
    • S.A. Koc, W.S. Neilson, Bribing the auctioneer in first-price sealed-bid auctions, Technical Report, Kocaeli University, 2006.
    • S.A. Koc, W.S. Neilson, Bribing the auctioneer in first-price sealed-bid auctions, Technical Report, Kocaeli University, 2006.
  • 35
    • 9544219688 scopus 로고    scopus 로고
    • Approximately-strategyproof and tractable multi-unit auctions
    • Kothari A., Parkes D.C., and Suri S. Approximately-strategyproof and tractable multi-unit auctions. Decision Support Systems 39 1 (2005) 105-121
    • (2005) Decision Support Systems , vol.39 , Issue.1 , pp. 105-121
    • Kothari, A.1    Parkes, D.C.2    Suri, S.3
  • 37
    • 17044390334 scopus 로고    scopus 로고
    • M. Kumar, S.I. Feldman, Internet auctions, in: Proceedings of Third USENIX Workshop on Electronic Commerce, 1998.
    • M. Kumar, S.I. Feldman, Internet auctions, in: Proceedings of Third USENIX Workshop on Electronic Commerce, 1998.
  • 39
    • 33748698027 scopus 로고    scopus 로고
    • S. Lahaie, An analysis of alternative slot auction designs for sponsored search, in: Proceedings of the Seventh ACM Conference on Electronic Commerce, 2006.
    • S. Lahaie, An analysis of alternative slot auction designs for sponsored search, in: Proceedings of the Seventh ACM Conference on Electronic Commerce, 2006.
  • 40
    • 52049109476 scopus 로고    scopus 로고
    • Y. Lengwiler, E. Wolfstetter, Bid rigging. an analysis of corruption in auctions, Technical Report, Humboldt-University at Berlin, 2005.
    • Y. Lengwiler, E. Wolfstetter, Bid rigging. an analysis of corruption in auctions, Technical Report, Humboldt-University at Berlin, 2005.
  • 41
    • 50249144147 scopus 로고    scopus 로고
    • Corruption in procurement auctions
    • Dimitri N., Piga G., and Spagnolo G. (Eds), Cambridge University Press (Chapter 16)
    • Lengwiler Y., and Wolfstetter E. Corruption in procurement auctions. In: Dimitri N., Piga G., and Spagnolo G. (Eds). Handbook of Procurement - Theory and Practice for Managers (2006), Cambridge University Press (Chapter 16)
    • (2006) Handbook of Procurement - Theory and Practice for Managers
    • Lengwiler, Y.1    Wolfstetter, E.2
  • 42
    • 52049083972 scopus 로고    scopus 로고
    • LiDIA-a library for computational number theory
    • LiDIA-Group. LiDIA-a library for computational number theory. TU Darmstadt 31 3 (2001) 54-57
    • (2001) TU Darmstadt , vol.31 , Issue.3 , pp. 54-57
    • LiDIA-Group1
  • 43
    • 84957026937 scopus 로고    scopus 로고
    • H. Lipmaa, N. Asokan, V. Niemi, Secure Vickrey auctions without threshold trust, in: Proceedings of the Sixth International Conference on Financial Cryptography (FC 2002), 2002, pp. 87-101.
    • H. Lipmaa, N. Asokan, V. Niemi, Secure Vickrey auctions without threshold trust, in: Proceedings of the Sixth International Conference on Financial Cryptography (FC 2002), 2002, pp. 87-101.
  • 46
    • 84944878354 scopus 로고    scopus 로고
    • A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 2001, URL: .
    • A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 2001, URL: .
  • 47
    • 52049116985 scopus 로고    scopus 로고
    • F.M. Menezes, P.K. Monteiro, Corruption and Auctions, Technical Report, Getulio Vargas Foundation, Rio de Janeiro, Brazil, 2001.
    • F.M. Menezes, P.K. Monteiro, Corruption and Auctions, Technical Report, Getulio Vargas Foundation, Rio de Janeiro, Brazil, 2001.
  • 51
    • 52049087173 scopus 로고    scopus 로고
    • T. Nakanishi, D. Yamamoto, Y. Sugiyama, Sealed-bid auctions with efficient bids, (accessed 13.04.2008).
    • T. Nakanishi, D. Yamamoto, Y. Sugiyama, Sealed-bid auctions with efficient bids, (accessed 13.04.2008).
  • 52
    • 84883898504 scopus 로고    scopus 로고
    • M. Naor, B. Pinkas, R. Sumner, Privacy preserving auctions and mechanism design, in: Proceedings of the First ACM Conference on Electronic Commerce, 1999, pp. 129-139.
    • M. Naor, B. Pinkas, R. Sumner, Privacy preserving auctions and mechanism design, in: Proceedings of the First ACM Conference on Electronic Commerce, 1999, pp. 129-139.
  • 53
    • 33144460420 scopus 로고    scopus 로고
    • Bidding languages for combinatorial auctions
    • Cramton P., Shoham Y., and Steinberg R. (Eds), Cambridge University Press
    • Nisan N. Bidding languages for combinatorial auctions. In: Cramton P., Shoham Y., and Steinberg R. (Eds). Combinatorial Auctions (2006), Cambridge University Press
    • (2006) Combinatorial Auctions
    • Nisan, N.1
  • 54
    • 52049086974 scopus 로고    scopus 로고
    • P. Paillier, Cryptographie à clé publique basée sur la r ésiduosité de degré composite, Ph.D. Thesis, École Nationale Supérieure des Tél écommunications, 1999.
    • P. Paillier, Cryptographie à clé publique basée sur la r ésiduosité de degré composite, Ph.D. Thesis, École Nationale Supérieure des Tél écommunications, 1999.
  • 55
    • 52049101204 scopus 로고    scopus 로고
    • P. Paillier, Public-key cryptosystems based on composite residuosity classes, in: Proceedings of EUROCRYPT'99, 1999, pp. 223-239.
    • P. Paillier, Public-key cryptosystems based on composite residuosity classes, in: Proceedings of EUROCRYPT'99, 1999, pp. 223-239.
  • 56
    • 0001751317 scopus 로고    scopus 로고
    • A study of collusion in first-price auctions
    • Pesendorfer M. A study of collusion in first-price auctions. The Review of Economic Studies 67 3 (2000) 381-411
    • (2000) The Review of Economic Studies , vol.67 , Issue.3 , pp. 381-411
    • Pesendorfer, M.1
  • 58
    • 85050842171 scopus 로고
    • Detection of bid-rigging in procurement auctions
    • Porter R.H., and Zona D.J. Detection of bid-rigging in procurement auctions. Journal of Political Economy 3 (1993) 518-538
    • (1993) Journal of Political Economy , Issue.3 , pp. 518-538
    • Porter, R.H.1    Zona, D.J.2
  • 59
    • 0010277907 scopus 로고
    • Digitalized signatures
    • Academic Press, New York
    • Rabin M.O. Digitalized signatures. Foundations of Secure Computing (1978), Academic Press, New York 155-166
    • (1978) Foundations of Secure Computing , pp. 155-166
    • Rabin, M.O.1
  • 60
    • 52049117927 scopus 로고    scopus 로고
    • M.O. Rabin, Digitalized signatures and public-key functions as intractable as factorization, Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science, 1979.
    • M.O. Rabin, Digitalized signatures and public-key functions as intractable as factorization, Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science, 1979.
  • 61
    • 82755188831 scopus 로고    scopus 로고
    • M.O. Rabin, R.A. Servedio, C. Thorpe, Highly efficient secrecy-preserving proofs of correctness of computations and applications, in: Proceedings of IEEE Symposium on Logic in Computer Science, 2007.
    • M.O. Rabin, R.A. Servedio, C. Thorpe, Highly efficient secrecy-preserving proofs of correctness of computations and applications, in: Proceedings of IEEE Symposium on Logic in Computer Science, 2007.
  • 62
    • 52049124606 scopus 로고    scopus 로고
    • M.O. Rabin, C. Thorpe, Time-lapse cryptography, Technical Report TR-22-06, Harvard University School of Engineering and Computer Science, 2006.
    • M.O. Rabin, C. Thorpe, Time-lapse cryptography, Technical Report TR-22-06, Harvard University School of Engineering and Computer Science, 2006.
  • 63
    • 52049093517 scopus 로고    scopus 로고
    • R.L. Rivest, A. Shamir, L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Technical Report MIT/LCS/TM-82, MIT Laboratory for Computer Science, 1977.
    • R.L. Rivest, A. Shamir, L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Technical Report MIT/LCS/TM-82, MIT Laboratory for Computer Science, 1977.
  • 64
    • 52049110128 scopus 로고    scopus 로고
    • R.L. Rivest, A. Shamir, D.A. Wagner, Time-lock puzzles and timed release crypto, Technical Report MIT/LCS/TR-684, MIT, 1996.
    • R.L. Rivest, A. Shamir, D.A. Wagner, Time-lock puzzles and timed release crypto, Technical Report MIT/LCS/TR-684, MIT, 1996.
  • 65
    • 0003247405 scopus 로고
    • Collusion and the choice of auction
    • Robinson M.S. Collusion and the choice of auction. Rand J. Econ. 16 1 (1985) 141-145
    • (1985) Rand J. Econ. , vol.16 , Issue.1 , pp. 141-145
    • Robinson, M.S.1
  • 68
    • 84927061848 scopus 로고    scopus 로고
    • Preventing collusion between firms in auctions
    • Janssen M.C.W. (Ed), Cambridge University Press (Chapter 3)
    • Salmon T.C. Preventing collusion between firms in auctions. In: Janssen M.C.W. (Ed). Auctioning Public Assets: Analysis and Alternatives (2004), Cambridge University Press (Chapter 3)
    • (2004) Auctioning Public Assets: Analysis and Alternatives
    • Salmon, T.C.1
  • 69
    • 33750696788 scopus 로고    scopus 로고
    • Changing the game in strategic sourcing at Procter & Gamble: expressive competition enabled by optimization
    • Sandholm T., Levine D., Concordia M., Martyn P., Hughes R., Jacobes J., and Begg D. Changing the game in strategic sourcing at Procter & Gamble: expressive competition enabled by optimization. Interfaces 36 1 (2006) 55-68
    • (2006) Interfaces , vol.36 , Issue.1 , pp. 55-68
    • Sandholm, T.1    Levine, D.2    Concordia, M.3    Martyn, P.4    Hughes, R.5    Jacobes, J.6    Begg, D.7
  • 70
    • 85159753453 scopus 로고    scopus 로고
    • T. Sandholm, S. Suri, A. Gilpin, D. Levine, Winner determination in combinatorial auction generalizations, in: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2002.
    • T. Sandholm, S. Suri, A. Gilpin, D. Levine, Winner determination in combinatorial auction generalizations, in: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2002.
  • 73
    • 52049111919 scopus 로고    scopus 로고
    • S.G. Stubblebine, P.F. Syverson, Fair on-line auctions without special trusted parties, in: Proceedings of Financial Cryptography, 1999.
    • S.G. Stubblebine, P.F. Syverson, Fair on-line auctions without special trusted parties, in: Proceedings of Financial Cryptography, 1999.
  • 74
    • 52049084872 scopus 로고    scopus 로고
    • K. Suzuki, M. Yokoo, Secure generalized Vickrey auction using homomorphic encryption, in: Proceedings Financial Cryptography, 2003.
    • K. Suzuki, M. Yokoo, Secure generalized Vickrey auction using homomorphic encryption, in: Proceedings Financial Cryptography, 2003.
  • 76
    • 38549171759 scopus 로고    scopus 로고
    • Cryptographic securities exchanges
    • Proceedings of Financial Cryptography and Data Security, Springer, Berlin/Heidelberg
    • Thorpe C., and Parkes D.C. Cryptographic securities exchanges. Proceedings of Financial Cryptography and Data Security. Lecture Notes in Computer Science vol. 4886 (2007), Springer, Berlin/Heidelberg 163-178
    • (2007) Lecture Notes in Computer Science , vol.4886 , pp. 163-178
    • Thorpe, C.1    Parkes, D.C.2
  • 78
    • 52049099448 scopus 로고    scopus 로고
    • US Central Intelligence Agency, The World Factbook: European Union, (accessed 13.04.2008).
    • US Central Intelligence Agency, The World Factbook: European Union, (accessed 13.04.2008).
  • 79
    • 84980096808 scopus 로고
    • Counterspeculation, auctions, and competitive sealed tenders
    • Vickrey W. Counterspeculation, auctions, and competitive sealed tenders. Journal of Finance 16 1 (1961) 8-37
    • (1961) Journal of Finance , vol.16 , Issue.1 , pp. 8-37
    • Vickrey, W.1
  • 80
    • 85159747054 scopus 로고    scopus 로고
    • M. Yokoo, K. Suzuki, Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions, in: Proceedings of the First International Conference on Autonomous Agents and Multiagent Systems, 2002.
    • M. Yokoo, K. Suzuki, Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions, in: Proceedings of the First International Conference on Autonomous Agents and Multiagent Systems, 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.