skip to main content
10.1145/336992.337028acmconferencesArticle/Chapter ViewAbstractPublication PagesecConference Proceedingsconference-collections
Article
Free Access

Privacy preserving auctions and mechanism design

Authors Info & Claims
Published:01 November 1999Publication History
First page image

References

  1. 1.http://auction.eecs.umich.edu]]Google ScholarGoogle Scholar
  2. 2.D. Beaver, S. Micali and P. Rogaway, "The round complexity of secure protocols", Proc. 22nd ACM Symp. on Theory of Computing, 1990, 503-513.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, "Relations among notions of security for public-key encryption schemes", Advances in Cryptology - Crypto '98, Springer-Verlag LNCS 1462 (1998), 26-45.]] Google ScholarGoogle ScholarCross RefCross Ref
  4. 4.M. Bellare and S. Micali, "Non-interactive oblivious transfer and applications", Proc. Adv. in Cryptology - Crypto '89, Springer-Verlag LNCS 435 (1990), 547-557.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.C. Cachin, "Efficient private bidding and auctions with an oblivious third party", to appear, Proc. 6th ACM Conf. on Computer and Communications Security, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.K. Chui and R. Zwick, "Auction on the Internet - A preliminary study", manuscript, 1999. Available at http://home.ust.hk/mkzwick/Internet_Auction.html]]Google ScholarGoogle Scholar
  7. 7.E. Clarke, "Multiparty pricing of public goods", Public Choice, 11:17-23, 1971.]]Google ScholarGoogle ScholarCross RefCross Ref
  8. 8.R. Cramer, I. Damgard and B. Schoenmakers, "Proofs of partial knowledge and simplified design of witness hiding protocols", Proc. Advances in Cryptology - Crypto '94, Springer-Verlag LNCS 839 (1994), 174- 187.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attacks", Proc. Advances in Cryptology - Crypto '98, Springer-Verlag LNCS 1462 (1998), 13-25.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.D. Dolev, C. Dwork and M. Naor, "Non-malleable cryptography", Proc. 23th ACM Symp. on Theory of Computing, 1991.Full version: to appear Siam J. on Computing. Available at http://www.wisdom.weizmann.ac.il/naor/onpub.html]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.R. Engelbrecht-Wiggans and C. M. Kahn, "Protecting the winner: second price vs. ascending bid auctions", Economic Letters, Vol. 35, 1991, 243-248.]]Google ScholarGoogle ScholarCross RefCross Ref
  12. 12.S. Even, O. Goldreich and A. Lempel, "A Randomized Protocol for Signing Contracts", Communications of the ACM 28, 1985, pp. 637-647.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.U. Feige, J. Kilian and M. Naor, "On minimal models for secure computation", Proc. 26th ACM Symp. on Theory of Computing, 1994, pp. 554-563.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.M. K. Franklin and M. K. Reiter, "The design and implementation of a secure auction server", IEEE Tran. on Software Engineering, 22(5), pp. 302-312, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.J. Glazer and A. Rubinstein, "Motives and implementation: on the design of mechanisms to elicit opinions", J. of Economic Theory 79, 157-173, 1998.]]Google ScholarGoogle ScholarCross RefCross Ref
  16. 16.O. Goldreich, Secure Multi-Party Computation (working draft) Version 1.1, 1998. Available at http://philby.ucsd.edu/books.html]]Google ScholarGoogle Scholar
  17. 17.O. Goldreich, S. Goldwasser and S. Micali, "How to construct random functions", J. of the ACM., vol. 33, 1986, 792-807.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.O. Goldreich, M. Micali and A. Wigderson, "How to play anymental game", Proc. 19th ACM Symp. on Theory of Computing, 1987, pp. 218-229.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.T. Groves, "Incentives in teams", Econometrica, 41:617-631, 1973.]]Google ScholarGoogle ScholarCross RefCross Ref
  20. 20.D. Gusfield and R. Irving, The Stable Marriage Problem : Structure and Algorithms, MIT Press, 1989.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.M. Harkavy, J. D.Tygar and H. Kikuchi, "Electronic auctions with private bids", 3rd USENIX Workshop on Electronic Commerce, pp. 61-73, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.Q. Huai and T. Sandholm, "Mobile Agents in an Electronic Auction House", Mobile Agents in the Context of Competition and Cooperation (MAC3-workshop), 1999.]]Google ScholarGoogle Scholar
  23. 23.R. Impagliazzo and S. Rudich, "Limits on the Provable Consequences of One-Way Permutations", 20th ACM Symp. on the Theory of Computing, 1989, 44-61.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.N. Kfir-Dahav, D. Monderer and M. Tennenholtz, "Mechanism design for resource bounded agents", 1998.]]Google ScholarGoogle Scholar
  25. 25.M. Kumar and S. I. Feldman, "Internet auctions", 3rd USENIX Workshop on Electronic Commerce, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.Luby M.,Pseudorandomness and Cryptographic Applications, Princeton University Press, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. 27.J. K. MacKie-Mason and H. R. Varian, "Generalized Vickrey auctions", 1994.]]Google ScholarGoogle Scholar
  28. 28.D. Monderer and M. Tennenholtz, "K-Price auctions", Working Paper, 1998.]]Google ScholarGoogle Scholar
  29. 29.D. Monderer and M. Tennenholtz, "Internet auctions", Working Paper, 1998.]]Google ScholarGoogle Scholar
  30. 30.N. Nisan and A. Ronen, "Algorithmic mechanism design", Proc. 31st ACM Symp. on Theory of Computing, 1999, 129-140.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. 31.A. J. Osborne and A. Rubinstein, A Course in Game Theory, MIT Press, 1994.]]Google ScholarGoogle Scholar
  32. 32.M. O. Rabin, "How to exchange secrets by oblivious transfer", Tech. Memo TR-81, Aiken Computation Laboratory, 1981.]]Google ScholarGoogle Scholar
  33. 33.A. E. Roth and M. A. Sotomayor, Two-Sided Matching : A Study in Game-Theoretic Modeling and Analysis, Cambridge Univ Press, 1990.]]Google ScholarGoogle ScholarCross RefCross Ref
  34. 34.S. G. Stubblebine and P. F.Syverson, "Fair on-line auctions without special trusted parties", Proc. of Financial Cryptography '99, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. 35.H. R. Varian, "Economic mechanism design for computerized agents", First USENIX Workshop on Electronic Commerce, 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. 36.D. Vickrey,"Counter speculation, auctions, and competitive sealed tenders", Journal of Finance, March 1961, pp. 9-37.]]Google ScholarGoogle Scholar
  37. 37.W. Walsh, M. Wellman, P. Wurman and J.K. MacKie- Mason, "Auction protocols for decentralized scheduling", 18th Int. Conf. on Distributed Computing Sys., 1998.]]Google ScholarGoogle Scholar
  38. 38.M. Wellman and P. Wurman, "Real time issues for Internet auctions", First IEEE Workshop on Dependable and Real-Time E-commerce Systems, 1998.]]Google ScholarGoogle Scholar
  39. 39.P. Wurman, W. Walsh and M. Wellman, "Flexible double auctions for electronic commerce: theory and implementation", Decision Support Systems 24:17-27, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. 40.A.C. Yao, "How to generate and exchange secrets", Proc. of the 27th IEEE Symp. on Foundations of Computer Science, 1986, pp. 162-167.]]Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy preserving auctions and mechanism design

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Conferences
                    EC '99: Proceedings of the 1st ACM conference on Electronic commerce
                    November 1999
                    187 pages
                    ISBN:1581131763
                    DOI:10.1145/336992

                    Copyright © 1999 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 1 November 1999

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • Article

                    Acceptance Rates

                    Overall Acceptance Rate664of2,389submissions,28%

                    Upcoming Conference

                    EC '24
                    The 25th ACM Conference on Economics and Computation
                    July 8 - 11, 2024
                    New Haven , CT , USA

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader