loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Sriram Krishnamachari 1 ; Mehrdad Nojoumian 1 and Kemal Akkaya 2

Affiliations: 1 Southern Illinois University, United States ; 2 Florida International University, United States

ISBN: 978-989-758-081-9

Keyword(s): Privacy-preserving Auction, Sealed-bid Auction, Unconditional Security, Computational Security.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Privacy Enhancing Technologies

Abstract: Designing a sealed-bid auction protocol is a challenging problem in the field of applied cryptography. In the last couple of decades, numerous protocols have been proposed in the literature where each one has its own property in terms of the security model, communication and computation complexities. To the best of our knowledge, there has been no study to implement and compare a similar class of sealed-bid auction protocols. This paper therefore implements and evaluates five different Dutch-style sealed-bid auction protocols, of which three protocols are computationally secure and two protocols are unconditionally secure. It mainly focuses on the computational cost of the initialization and verification phases of these privacy-preserving protocols.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.81.29.226

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Krishnamachari, S.; Nojoumian, M. and Akkaya, K. (2015). Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security.In Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-081-9, pages 106-113. DOI: 10.5220/0005258501060113

@conference{icissp15,
author={Sriram Krishnamachari. and Mehrdad Nojoumian. and Kemal Akkaya.},
title={Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security},
booktitle={Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2015},
pages={106-113},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005258501060113},
isbn={978-989-758-081-9},
}

TY - CONF

JO - Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security
SN - 978-989-758-081-9
AU - Krishnamachari, S.
AU - Nojoumian, M.
AU - Akkaya, K.
PY - 2015
SP - 106
EP - 113
DO - 10.5220/0005258501060113

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.