Skip to main content

Interleaving Cryptography and Mechanism Design

The Case of Online Auctions

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3110))

Abstract

We propose a new cryptographically protected multi-round auction mechanism for online auctions. This auction mechanism is designed to provide (in this order) security, cognitive convenience, and round-effectiveness. One can vary internal parameters of the mechanism to trade off bid privacy and cognitive costs, or cognitive costs and the number of rounds. We are aware of no previous work that interleaves cryptography explicitly with the mechanism design.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blaze, M. (ed.): FC 2002. LNCS, vol. 2357. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  2. National White Collar Crime Center and Federal Bureau of Investigation. IFCC 2002 Internet Fraud Report, as of April 2003 (2003), Available at http://www1.ifccfbi.gov/strategy/IFCC2002IFCCReport.pdf

  3. Damgård, I., Fujisaki, E.: An Integer Commitment Scheme Based on Groups with Hidden Order. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 125–142. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions Information Theory IT-22, 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  5. Damgård, I., Jurik, M.: A Generalisation, a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Weiß, G., Brandt, F.: Antisocial Agents and Vickrey Auctions. In: Intelligent Agents VIII, Seattle,WA, USA, August 1-3, pp. 335–347 (2001) (revised papers)

    Google Scholar 

  7. Juels, A., Szydlo, M.: A Two-Server, Sealed-Bid Auction Protocol. In: Blaze [Bla02], pp. 72–86

    Google Scholar 

  8. Krishna, V.: Auction Theory. Academic Press, London (2002)

    Google Scholar 

  9. Laih, C.-S. (ed.): ASIACRYPT 2003. LNCS, vol. 2894. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  10. Lipmaa, H., Asokan, N., Niemi, V.: Secure Vickrey Auctions without Threshold Trust. In: Blaze [Bla02], pp. 87–101

    Google Scholar 

  11. Lipmaa, H.: On Diophantine Complexity and Statistical Zero-Knowledge Arguments. In: Laih [Lai03], pp. 398–415

    Google Scholar 

  12. Lipmaa, H.: Verifiable Homomorphic Oblivious Transfer and Private Equality Test. In: Laih [Lai03], pp. 416–433

    Google Scholar 

  13. Larson, K., Sandholm, T.: Costly Valuation Computation in Auctions. In: van Benthem, J. (ed.) Eighth Conference of Theoretical Aspects of Knowledge and Rationality (TARK VIII), Certosa di Pontignano, University of Siena, Italy, July 8-10, Morgan Kaufmann, San Francisco (2001)

    Google Scholar 

  14. Lucking-Reiley, D.: Auctions on the Internet: What’s Being Auctioned, and How? Journal of Industrial Economics 48(3), 227–252 (2000)

    Article  Google Scholar 

  15. Milgrom, P.R., Weber, R.J.: A Theory of Auctions and Competitive Bidding. Econometrica 50(5), 1089–1122 (1982)

    Article  MATH  Google Scholar 

  16. Naor, M., Pinkas, B., Sumner, R.: Privacy Preserving Auctions and Mechanism Design. In: The 1st ACM Conference on Electronic Commerce, Denver, Colorado (November 1999)

    Google Scholar 

  17. Nurmi, H., Salomaa, A.: Cryptographic Protocols for Vickrey Auctions. Group Decision and Negotiation 2, 363–373 (1993)

    Article  Google Scholar 

  18. Parkes, D.C.: Optimal Auction Design for Agents with Hard Valuation Problems. In: Moukas, A., Ygge, F., Sierra, C. (eds.) Agent Mediated Electronic Commerce II. LNCS, vol. 1788, pp. 206–219. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  19. Parkes, D.C., Ungar, L.H., Foster, D.P.: Accounting for Cognitive Costs in On-line Auction Design. In: Noriega, P., Sierra, C. (eds.) AMET 1998 and AMEC 1998. LNCS (LNAI), vol. 1571, pp. 25–40. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  20. Perry, M., Wolfstetter, E., Zamir, S.: A Sealed-Bid Auction that Matches the English Auction. Games and Economic Behaviour 33(2), 265–273 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  21. Rothkopf, M.H., Harstad, R.M.: Two Models of Bid-Taker Cheating in Vickrey Auctions. Journal of Business 68(2), 257–267 (1995)

    Article  Google Scholar 

  22. Rothkopf, M.H., Teisberg, T.J., Kahn, E.P.: Why are Vickrey Auctions Rare? The Journal of Political Economy 98(1), 94–109 (1990)

    Article  Google Scholar 

  23. Ungar, L.H., Parkes, D.C., Foster, D.P.: Cost and Trust Issues in On-Line Auctions. In: Agents 1998 Workshop on Agent Mediated Electronic Trading (AMET 1998), Minneapolis/St.Paul, MN (1998)

    Google Scholar 

  24. Vickrey, W.: Counterspeculation, Auctions, and Competitive Sealed Tenders. Journal of Finance 16(1), 8–37 (1961)

    Article  Google Scholar 

  25. Yao, A.C.-C.: Protocols for Secure Computations (Extended Abstract). In: 23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, USA, November 3-5, pp. 160–164. IEEE Computer Society Press, Los Alamitos (1982)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Elkind, E., Lipmaa, H. (2004). Interleaving Cryptography and Mechanism Design. In: Juels, A. (eds) Financial Cryptography. FC 2004. Lecture Notes in Computer Science, vol 3110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27809-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-27809-2_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22420-4

  • Online ISBN: 978-3-540-27809-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics