首页> 外文会议>International conference on information security practice and experience >Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing
【24h】

Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing

机译:使用可验证秘密共享的高效密封投标拍卖协议

获取原文

摘要

This article proposes efficient solutions for the construction of sealed-bid second-price and combinatorial auction protocols in an active adversary setting. The main reason for constructing secure auction protocols is that the losing bids can be used in the future auctions as well as negotiations if they are not kept private. Our motivation is to apply verifiable secret sharing in order to construct various kinds of sealed-bid auctions. We initially propose two secure second-price auction protocols with different masking methods. Subsequently, we provide two secure combinatorial auction protocols based on our second masking approach. In the first scheme, we apply an existing dynamic programming method. In the second protocol, we use inter-agent negotiation as an approximate solution in the multiple traveling salesman problem to determine auction outcomes. It is worth mentioning that our protocols are independent of the secret sharing scheme that is being used.
机译:本文提出了一种有效的解决方案,用于在积极的对手环境中构建密封报价第二价格和组合拍卖协议。构建安全拍卖协议的主要原因是,如果竞标不被保密,则可以在以后的拍卖以及谈判中使用败标。我们的动机是应用可验证的秘密共享来构建各种密封的竞标拍卖。我们最初提出了两种具有不同掩蔽方法的安全第二价格拍卖协议。随后,我们根据第二种屏蔽方法提供了两个安全的组合拍卖协议。在第一种方案中,我们应用了现有的动态编程方法。在第二个协议中,我们使用代理间协商作为多重旅行商问题中的近似解决方案来确定拍卖结果。值得一提的是,我们的协议独立于所使用的秘密共享方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号