Secure Second Price Auctions with a Rational Auctioneer

Download Now
Provided by: International Association for Cryptologic Research
Topic: Security
Format: PDF
The authors present novel security requirements for second price auctions and a simple, efficient and practical protocol that provably maintains these requirements. Novel requirements are needed because commonly used requirements, such as the in-distinguishability-based secrecy requirement of encryption schemes presented by (Goldwasser and Micali, 1982), do not fit properly in the second price auctions context. Additionally, the presented protocol uses a trustworthy supervisor that checks if the auctioneer deviated from the protocol and fines them accordingly.
Download Now

Find By Topic