Secure auctions without cryptography

5Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

An auction is a simple way of selling and buying goods. Modern auction protocols often rely on complex cryptographic operations to ensure manifold security properties such as bidder-anonymity or bid-privacy, non-repudiation, fairness or public verifiability of the result. This makes them difficult to understand for users who are not experts in cryptography. We propose two physical auction protocols inspired by Sako's cryptographic auction protocol. In contrast to Sako's protocol, they do not rely on cryptographic operations, but on physical properties of the manipulated mechanical objects to ensure the desired security properties. The first protocol only uses standard office material, whereas the second uses a special wooden box. We validate the security of our solutions using ProVerif. © 2014 Springer International Publishing.

Cite

CITATION STYLE

APA

Dreier, J., Jonker, H., & Lafourcade, P. (2014). Secure auctions without cryptography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8496 LNCS, pp. 158–170). Springer Verlag. https://doi.org/10.1007/978-3-319-07890-8_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free