The design and implementation of a secure auction service
- 1 May 1996
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Software Engineering
- Vol. 22 (5) , 302-312
- https://doi.org/10.1109/32.502223
Abstract
We present the design and implementation of a distributed service for performing sealed bid auctions. This service provides an interface by which clients, or "bidders", can issue secret bids to the service for an advertised auction. Once the bidding period has ended, the auction service opens the bids, determines the winning bid, and provides the winning bidder with a ticket for claiming the item bid upon. Using novel cryptographic techniques, the service is constructed to provide strong protection for both the auction house and correct bidders, despite the malicious behavior of any number of bidders and fewer than one third of the servers comprising the auction service. Specifically, it is guaranteed that: bids of correct bidders are not revealed until after the bidding period has ended; the auction house collects payment for the winning bid; losing bidders forfeit no money; and only the winning bidder can collect the item bid upon. We also discuss techniques to enable anonymous bidding.Keywords
This publication has 19 references indexed in Scilit:
- Untraceable Off-line Cash in Wallet with ObserversPublished by Springer Nature ,2001
- Efficient Identification and Signatures for Smart CardsPublished by Springer Nature ,2001
- NetCashPublished by Association for Computing Machinery (ACM) ,1993
- Untraceable Electronic CashPublished by Springer Nature ,1990
- A practical scheme for non-interactive verifiable secret sharingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Security without identification: transaction systems to make big brother obsoleteCommunications of the ACM, 1985
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Electronic WalletPublished by Springer Nature ,1984
- The Byzantine Generals ProblemACM Transactions on Programming Languages and Systems, 1982
- How to share a secretCommunications of the ACM, 1979