Abstract
In recent years, auctions have become a very popular price discovery mechanism in the Internet. The common auction formats are typically centralized in nature. The peer-to-peer paradigm demands gearing up auctions for decentralized infrastructures. In this context, this paper proposes a distributed mechanism for ascending second-price auctions that relies on standard cryptographic algorithms. In essence, the auction protocol has the capability of preserving the privacy of the winning bidder’s true valuation.
The auction protocol makes use of a high number of auctioneers divided into several groups. A bidder creates an encrypted chain of monotonously increasing bidding steps, where each bidding step can be decrypted by a different auctioneer group. This considerably reduces the attack and manipulation possibilities of malicious auctioneers. In addition, this secure approach does not require bidders to be online unless they are submitting their bid chain to the auctioneers.
Similar content being viewed by others
References
Abe, M.; Suzuki, K.: M+1-st price auction using homomorphic encryption. 5th International Conference on Public Key Cryptography, 2002.
Baudron, O.; Stern, J.: Non-interactive private auctions. 5th Annual Conference on Financial Cryptography, 2001.
Brandt, F.: A verifiable, bidder-resolved auction protocol. AAMASWorkshop on Deception, Fraud and Trust in Agent Societies, 2002.
Brandt, F.: Fully private auctions in a constant number of rounds. 7th International Conference on Financial Cryptography (FC), 2003.
Brandt, F.: How To Obtain Full Privacy in Auctions. Preliminary Draft, February 9, 2005.
Cachin, C.: Efficient private bidding and auctions with an oblivious third party. 6th ACM Conference on Computer and Communications Security, 1999.
Fontoura, M.; Ionescu, M.; Minsky, N.: Decentralized Peer-to-Peer Auctions. In: Electronic Commerce Research Journal 5 (2005) 1, S. 7–24.
Franklin, M. K.; Reiter, M. K.: The design and implementation of a secure auction service. In: IEEE Transactions on Software Engineering 22 (1996), S. 302–312.
Hausheer, D.; Stiller, B.: Decentralized Auction-based Pricing with PeerMart. 9th IFIP/IEEE International Symposium on Integrated Network Management (IM 2005), Nice, France, 2005.
Hausheer, D.; Stiller, B.: PeerMart: The Technology for a Distributed Auction-based Market for Peer-to-Peer Services. 40th IEEE International Conference on Communications (ICC 2005), Seoul, Korea, 2005.
Kikuchi, H.: (M+1)st-price auction protocol. 5th International Conference on Financial Cryptography (FC), 2001.
Kikuchi, H.; Hotta, S.; Abe, K.; Nakanishi, S.: Resolving winner and winning bid without revealing privacy of bids. International Workshop on Next Generation Internet, 2000.
Lipmaa, H.; Asokan, N.; Niemi, V.: Secure Vickrey auctions without threshold trust. 6th International Conference on Financial Cryptography (FC), 2002.
McAfee, A.: The Napsterization of B2B. In: Harvard Business Review 78 (2000) 6, S. 18–9.
Ratnasamy, S.; Francis, P.; Handley, M.; Karp, R.; Shenker, S.: A Scalable Content-Addressable Network. ACM SIGCOMM, San Diego, CA, 2001.
Schneier, B.: Attack Trees: Modeling Security Threats. In: Dr. Dobb’s Journal. December 1999.
Stoica, I.; Morris, R.; Karger, D.; Kaashoek, M. F.; Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM, San Diego, CA, 2001.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Rolli, D., Conrad, M., Neumann, D. et al. Distributed ascending proxy auction — A cryptographic approach. Wirtsch. Inform. 48, 7–15 (2006). https://doi.org/10.1007/s11576-006-0002-5
Issue Date:
DOI: https://doi.org/10.1007/s11576-006-0002-5