Abstract | ||
---|---|---|
In recent years, auctions have become a very popular price discovery mechanism in the Internet. The common auction formats
are typically centralized in nature. The peer-to-peer paradigm demands gearing up auctions for decentralized infrastructures.
In this context, this paper proposes a distributed mechanism for ascending second-price auctions that relies on standard cryptographic
algorithms. In essence, the auction protocol has the capability of preserving the privacy of the winning bidder’s true valuation.
The auction protocol makes use of a high number of auctioneers divided into several groups. A bidder creates an encrypted
chain of monotonously increasing bidding steps, where each bidding step can be decrypted by a different auctioneer group.
This considerably reduces the attack and manipulation possibilities of malicious auctioneers. In addition, this secure approach
does not require bidders to be online unless they are submitting their bid chain to the auctioneers. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1007/s11576-006-0002-5 | Wirtschaftsinformatik |
Keywords | Field | DocType |
price discovery,second price auction | Cryptographic protocol,Eauction,Computer security,Computer science,Combinatorial auction,Generalized second-price auction,Common value auction,Auction theory,Forward auction,Bidding | Journal |
Volume | Issue | ISSN |
48 | 1 | 1861-8936 |
Citations | PageRank | References |
3 | 0.70 | 8 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Daniel Rolli | 1 | 42 | 5.39 |
Michael Conrad | 2 | 36 | 5.22 |
Dirk Neumann | 3 | 73 | 11.89 |
Christoph Sorge | 4 | 172 | 22.16 |