Skip to main content

A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2357))

Abstract

A second-price sealed-bid auction is that a bidder who offers the highest price gets a good in the second highest price. This style of auction solves the problems of both an English auction and a first-price sealed-bid auction. An electronic first-price sealed-bid auction cannot directly be applied to a second-price sealed-bid auction which keeps the highest bid secret. We propose the verifiable discriminant function of the p 0-th root. Our auction scheme satisfies public verifiability of auction results, and also does not have a single entity who knows the highest bid value even after an auction. Furthermore the bidding cost of our scheme is lower than that of the previous one.

This work has been supported by the Telecommunications Advancement Organization of Japan under the grant for international joint research related to information-communications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abe and K. Suzuki. “M+l-st Price Auction Using Homomorphic Encryption”. In Proceedings of the 5-th International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2002), LNCS, Springer-Verlag, page to appear, 2002.

    Google Scholar 

  2. C. Cachin. “Efficient Private Bidding and Auctions with an Oblivious Third Party”. In Proceedings of the 6th ACM Conference on Computer and Communications Security, pages 120–127, 1999.

    Google Scholar 

  3. J. Camenisch and M. Michels. “A Group Signature Scheme with Improved Efficiency”. In Advances in Cryptology-ASIACRYPT’ 98, LNCS 1514, Springer-Verlag, pages 160–174, 1998.

    Google Scholar 

  4. K. Chida, K. Kobayashi, and H. Morita. “Efficient Sealed-bid Auctions for Massive Numbers of Bidders with Lump Comparison”. In Proceedings of the 4th Information Security Conference (ISC 2001), LNCS 2200, Springer-Verlag, pages 408–419, 2001.

    Google Scholar 

  5. M. Jakobsson and A. Juels. “Mix and Match: Secure Function Evaluation via Ciphertexts”. In Advances in Cryptology-ASIACRYPT 2000, LNCS 1976, Springer-Verlag, pages 162–177, 2000.

    Chapter  Google Scholar 

  6. H. Kikuchi. “(M+l)st-Price Auction Protocol”. In Proceedings of the 5th International Financial Cryptography (FC 2001), LNCS, Springer-Verlag, page to appear, 2001.

    Google Scholar 

  7. H. Kikuchi, M. Harkavy, and D. Tyger. “Multi-round anonymous auction protocols”. In Proceedings of the First IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pages 62–69, 1998.

    Google Scholar 

  8. K. Kobayashi, H. Morita, K. Suzuki, and M. Hakuta. “Efficient Sealed-bid Auction by Using One-way Functions”. IEICE Trans. Fundamentals, Vol.E84-A,No.l:pp.289–294, 2001.

    Google Scholar 

  9. M. Kudo. “Secure electronic sealed-bid auction protocol with public key cryptography”. IEICE Trans. Fundamentals, Vol.E81-A,No.l:pp.20–27, 1998.

    Google Scholar 

  10. M. Manbo and H. Shizuya. “A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme”. IEICE Trans. Fundamentals, Vo1.E82-A,No.l:77–80, 1999.

    Google Scholar 

  11. T. Nakanishi, T. Fujiwara, and H. Watanabe. “An Anonymous Bidding Protocol without Any Reliable Center”. Trans. IPS Japan, Vol.41,No.8:pp.2161–2169, 2000.

    Google Scholar 

  12. M. Naor, B. Pinkas, and R. Sumner. “Privacy Preserving Auctions and Mechanism Design”. In Proceedings of ACM Conference on Electronic Commerce, pages 120–127, 1999.

    Google Scholar 

  13. K. Omote and A. Miyaji. “An Anonymous Auction Protocol with a Single Nontrusted Center using Binary Trees”. In Proceedings of Information Security Workshop (ISW 2000), LNCS 1975, Springer-Verlag, pages 108–120, 2000.

    Google Scholar 

  14. K. Omote and A. Miyaji. “An Anonymous Sealed-bid Auction with a Feature of Entertainment”. Trans. IPS Japan, Vol.42, No.8:pp.2049–2056, 2001.

    Google Scholar 

  15. K. Sako. “An Auction Protocol Which Hides Bids of Losers”. In Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2000), LNCS 1751, Springer-Verlag, pages 422–432, 2000.

    Google Scholar 

  16. K. Sakurai and S. Miyazaki. “An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme”. In Proceedings of the 5th Australasian Conference on Information and Privacy (ACISP 2000), LNCS 1841, Springer-Verlag, pages 385–399, 2000.

    Google Scholar 

  17. K. Suzuki, K. Kobayashi, and H. Morita. “Efficient Sealed-bid Auction Using Hash Chain”. In Proceedings of the Third International Conference on Information Security and Cryptology (ICISC 2000), LNCS 2015, Springer-Verlag, pages 189–197, 2000.

    Google Scholar 

  18. W. Vickrey. “Counter Speculation, Auctions, and Competitive Sealed Tenders”. Journal of Finance, Vol.16:pp.8–37, 1961.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 IFCA/Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Omote, K., Miyaji, A. (2003). A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root. In: Blaze, M. (eds) Financial Cryptography. FC 2002. Lecture Notes in Computer Science, vol 2357. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36504-4_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-36504-4_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00646-6

  • Online ISBN: 978-3-540-36504-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics