Secure second price auctions with a rational auctioneer

Boaz Catane, Amir Herzberg

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

We present novel security requirements for second price auctions and a simple, efficient and practical protocol that provably maintains these requirements. Novel requirements are needed because commonly used requirements, such as the indistinguishability-based secrecy requirement of encryption schemes presented by (Goldwasser and Micali, 1982), do not fit properly in the second price auctions context. Additionally, the presented protocol uses a trustworthy supervisor that checks if the auctioneer deviated from the protocol and fines him accordingly. By making sure the expected utility of the auctioneer when deviating from the protocol is lower than his expected utility when abiding by the protocol we ascertain that a rational auctioneer will abide by the protocol. This allows the supervisor to optimize by performing (computationally- intensive) inspections of the auctioneer with only low probability.

Original languageEnglish
Title of host publicationICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings
Pages158-169
Number of pages12
StatePublished - 2013
Event10th International Conference on Security and Cryptography, SECRYPT 2013 - Part of 10th International Joint Conference on E-Business and Telecommunications, ICETE 2013 - Reykjavik, Iceland
Duration: 29 Jul 201331 Jul 2013

Publication series

NameICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings

Conference

Conference10th International Conference on Security and Cryptography, SECRYPT 2013 - Part of 10th International Joint Conference on E-Business and Telecommunications, ICETE 2013
Country/TerritoryIceland
CityReykjavik
Period29/07/1331/07/13

Keywords

  • Auctions
  • Cryptographic auction schemes
  • Cryptographic protocols
  • Vickrey auctions

Fingerprint

Dive into the research topics of 'Secure second price auctions with a rational auctioneer'. Together they form a unique fingerprint.

Cite this