Abstract
We propose a new cryptographically protected multi-round auction mechanism for online auctions. This auction mechanism is designed to provide (in this order) security, cognitive convenience, and round-effectiveness. One can vary internal parameters of the mechanism to trade off bid privacy and cognitive costs, or cognitive costs and the number of rounds. We are aware of no previous work that interleaves cryptography explicitly with the mechanism design.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Blaze, M. (ed.): FC 2002. LNCS, vol. 2357. Springer, Heidelberg (2003)
National White Collar Crime Center and Federal Bureau of Investigation. IFCC 2002 Internet Fraud Report, as of April 2003 (2003), Available at http://www1.ifccfbi.gov/strategy/IFCC2002IFCCReport.pdf
Damgård, I., Fujisaki, E.: An Integer Commitment Scheme Based on Groups with Hidden Order. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 125–142. Springer, Heidelberg (2002)
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions Information Theory IT-22, 644–654 (1976)
Damgård, I., Jurik, M.: A Generalisation, a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001)
Weiß, G., Brandt, F.: Antisocial Agents and Vickrey Auctions. In: Intelligent Agents VIII, Seattle,WA, USA, August 1-3, pp. 335–347 (2001) (revised papers)
Juels, A., Szydlo, M.: A Two-Server, Sealed-Bid Auction Protocol. In: Blaze [Bla02], pp. 72–86
Krishna, V.: Auction Theory. Academic Press, London (2002)
Laih, C.-S. (ed.): ASIACRYPT 2003. LNCS, vol. 2894. Springer, Heidelberg (2003)
Lipmaa, H., Asokan, N., Niemi, V.: Secure Vickrey Auctions without Threshold Trust. In: Blaze [Bla02], pp. 87–101
Lipmaa, H.: On Diophantine Complexity and Statistical Zero-Knowledge Arguments. In: Laih [Lai03], pp. 398–415
Lipmaa, H.: Verifiable Homomorphic Oblivious Transfer and Private Equality Test. In: Laih [Lai03], pp. 416–433
Larson, K., Sandholm, T.: Costly Valuation Computation in Auctions. In: van Benthem, J. (ed.) Eighth Conference of Theoretical Aspects of Knowledge and Rationality (TARK VIII), Certosa di Pontignano, University of Siena, Italy, July 8-10, Morgan Kaufmann, San Francisco (2001)
Lucking-Reiley, D.: Auctions on the Internet: What’s Being Auctioned, and How? Journal of Industrial Economics 48(3), 227–252 (2000)
Milgrom, P.R., Weber, R.J.: A Theory of Auctions and Competitive Bidding. Econometrica 50(5), 1089–1122 (1982)
Naor, M., Pinkas, B., Sumner, R.: Privacy Preserving Auctions and Mechanism Design. In: The 1st ACM Conference on Electronic Commerce, Denver, Colorado (November 1999)
Nurmi, H., Salomaa, A.: Cryptographic Protocols for Vickrey Auctions. Group Decision and Negotiation 2, 363–373 (1993)
Parkes, D.C.: Optimal Auction Design for Agents with Hard Valuation Problems. In: Moukas, A., Ygge, F., Sierra, C. (eds.) Agent Mediated Electronic Commerce II. LNCS, vol. 1788, pp. 206–219. Springer, Heidelberg (2000)
Parkes, D.C., Ungar, L.H., Foster, D.P.: Accounting for Cognitive Costs in On-line Auction Design. In: Noriega, P., Sierra, C. (eds.) AMET 1998 and AMEC 1998. LNCS (LNAI), vol. 1571, pp. 25–40. Springer, Heidelberg (1999)
Perry, M., Wolfstetter, E., Zamir, S.: A Sealed-Bid Auction that Matches the English Auction. Games and Economic Behaviour 33(2), 265–273 (2000)
Rothkopf, M.H., Harstad, R.M.: Two Models of Bid-Taker Cheating in Vickrey Auctions. Journal of Business 68(2), 257–267 (1995)
Rothkopf, M.H., Teisberg, T.J., Kahn, E.P.: Why are Vickrey Auctions Rare? The Journal of Political Economy 98(1), 94–109 (1990)
Ungar, L.H., Parkes, D.C., Foster, D.P.: Cost and Trust Issues in On-Line Auctions. In: Agents 1998 Workshop on Agent Mediated Electronic Trading (AMET 1998), Minneapolis/St.Paul, MN (1998)
Vickrey, W.: Counterspeculation, Auctions, and Competitive Sealed Tenders. Journal of Finance 16(1), 8–37 (1961)
Yao, A.C.-C.: Protocols for Secure Computations (Extended Abstract). In: 23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, USA, November 3-5, pp. 160–164. IEEE Computer Society Press, Los Alamitos (1982)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Elkind, E., Lipmaa, H. (2004). Interleaving Cryptography and Mechanism Design. In: Juels, A. (eds) Financial Cryptography. FC 2004. Lecture Notes in Computer Science, vol 3110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27809-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-27809-2_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22420-4
Online ISBN: 978-3-540-27809-2
eBook Packages: Springer Book Archive