Logo des Repositoriums
 

Distributed ascending proxy auction — A cryptographic approach

dc.contributor.authorRolli, Daniel
dc.contributor.authorConrad, Michael
dc.contributor.authorNeumann, Dirk
dc.contributor.authorSorge, Christoph
dc.date.accessioned2018-01-16T08:54:06Z
dc.date.available2018-01-16T08:54:06Z
dc.date.issued2006
dc.description.abstractIn recent years, auctions have become a very popular price discovery mechanism in the Internet. The common auction formats are typically centralized in nature. The peer-to-peer paradigm demands gearing up auctions for decentralized infrastructures. In this context, this paper proposes a distributed mechanism for ascending second-price auctions that relies on standard cryptographic algorithms. In essence, the auction protocol has the capability of preserving the privacy of the winning bidder’s true valuation.The auction protocol makes use of a high number of auctioneers divided into several groups. A bidder creates an encrypted chain of monotonously increasing bidding steps, where each bidding step can be decrypted by a different auctioneer group. This considerably reduces the attack and manipulation possibilities of malicious auctioneers. In addition, this secure approach does not require bidders to be online unless they are submitting their bid chain to the auctioneers.
dc.identifier.pissn1861-8936
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/12525
dc.publisherSpringer
dc.relation.ispartofWirtschaftsinformatik: Vol. 48, No. 1
dc.relation.ispartofseriesWIRTSCHAFTSINFORMATIK
dc.subjectDistributed Auctions
dc.subjectInternet Economics
dc.subjectPeer-to-Peer Systems
dc.subjectPrivacy
dc.subjectSecurity Protocols
dc.subjectTrust
dc.titleDistributed ascending proxy auction — A cryptographic approach
dc.typeText/Journal Article
gi.citation.endPage15
gi.citation.startPage7

Dateien