Browse > Article
http://dx.doi.org/10.13089/JKIISC.2002.12.6.3

An efficient sealed-bid auction protocol  

신상욱 (한국전자통신연구원 정보보호연구본부)
류희수 (한국전자통신연구원 정보보호연구본부)
Abstract
In this paper, we propose an efficient and secure sealed-bid auction protocol with two servers, a seller S and a third party A . The proposed scheme uses the idea of the conditional oblivious transfer protocol proposed by Crescenzo-Ostrovskey-Rajagopalan. A server A is not a trusted third party, but is assumed not to collude with a server S. In the proposed auction protocol, barring collusion between A and S, neither party gains any information about the bids, and moreover, the outcome of the auction will be correct. And the computational complexity of our auction protocol is considerably efficient and the communication overhead is similar to that of Naor-Pinkas-Sumner's scheme.
Keywords
secure auction protocol; sealed-bid; oblivion transfer; conditional oblivious transfer;
Citations & Related Records
연도 인용수 순위
  • Reference
1 An auction protocol which hides bids of losers /
[ K. Sako ] / PKC'00, LNCS 1751
2 Efficient private bidding and auctions with an oblivious third party /
[ C. Cachin ] / ACM CCS'99
3 The design and implementation of a secure auction server /
[ M. Franklin;M. Reiter ] / IEEE Trans. on Information Theory
4 Non-interactive private auctions /
[ O. Baudron;J. Stern ] / Financial Cryptography'01
5 Zero-Knowledge arguments and publickey cryptography /
[ G. De Santis;G. Di Crescenzo;G. Persiano ] / Information and Computation   DOI   ScienceOn
6 A two-server sealed-bid auction protocol /
[ A. Juels;M. Szydlo ] / Financial Cryptography'02
7 Probabilistic encryption /
[ S. Goldwasser;S. Micali ] / J. Comp. Sys. Sci.   DOI
8 Privacy preserving auctions and mechanism design /
[ M. Naor;B. Pinkas;R. Sumner ] / ACM Conf. on Electronic Commerce
9 Non-malleable cryptography /
[ D. Dolev;D. Dwork;M. Naor ] / ACM Symp. on Theory of Computing
10 Conditional oblivious transfer and timed-released encryption /
[ G. Di Crescenzo;R. Ostrovsky;S. Rajagopalan ] / Advances in Cryptography - Eurocrypt'99, LNCS 1592
11 How to exchange secrets by oblivious transfer /
[ M.O. Rabin ] / Tech. Memo TR-81
12 Electronic auctions with private bids /
[ M. Harkavy;J.D. Tygar;H. Kikuchi ] / 3rd USENIX Workshop on Electronic Commerce
13 Mix and match Secure function evaluation via ciphertexts /
[ M. Jakobsson;A. Juels ] / Advances in Cryptography - Asiacrypt'00, LNCS 1976
14 Protocols for secure computations /
[ A.C. Yao ] / FOCS'82