Secure double auction protocols with full privacy protection

10Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Many researches have been done on the strategies of double auctions, an important class of auction protocols that permit multiple buyers and sellers to- trade simultaneously in a market. Some well designed dominant-strategy incentive compatible double auction protocols have been proposed. However, the security and the privacy issues in double auctions are seldom studied in the literatures. In this paper, we propose secure double auction protocols, which achieve full privacy protection of participants. That is, each bid/ask information is always kept secret, even when there is any collusion of participants. It is clear that our suggestion is stronger than other previous work in which assumptions that certain auctioneers never collude are made. To achieve full privacy protection, we employ homomorphic ElGamal encryption and distribute the private key among the all participants. In such a way, all participants jointly compute the outcome of the double auction without revealing any additional bid/ask information. Also, the proposed protocol is publicly verifiable, so that the robustness is assured. The communication and computation complexity of the proposed protocols are analyzed. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Wang, C., Leung, H. F., & Wang, Y. (2004). Secure double auction protocols with full privacy protection. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2971, 215–229. https://doi.org/10.1007/978-3-540-24691-6_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free