Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
How to obtain full privacy in auctions
Brandt F. International Journal of Information Security5 (4):201-216,2006.Type:Article
Date Reviewed: Nov 15 2007

The author proposes an interesting general technique for granting privacy in auctions: the protocol yields only the winner(s) and the final price, and only to the winners themselves. The author develops the algorithm for (M+1)st price auctions, where a number M of identical objects are being auctioned, and the M winners pay the price the (M+1)st bidder offered.

The protocol seeks to eliminate the need for a trusted party, such as an auction site, to manage the blind auction. It is replaced with a more relaxed security assumption of a designated agent (namely, the seller) who must not disengage from the protocol or reveal information prematurely. Since these behaviors may cause bidders to leave the auction early, but not lose privacy, it is in the auctioneer’s interest to play fairly.

The algorithm is theoretically interesting, but has some practical limitations: first, the bidders have a fixed set of prices they can offer, and, second, the amount of data exchanged during the protocol is high, making it unusable (for example, for financial interactions).

Reviewer:  Stefano Zanero Review #: CR134943 (0809-0916)
Bookmark and Share
 
Security (K.4.4 ... )
 
 
Security and Protection (K.6.5 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Security": Date
Security fundamentals for e-commerce
Hassler V., Artech House, Inc., Norwood, MA, 2000.  409, Type: Book (9781580531085)
May 20 2002
Building firm trust online
Schoder D., Yin P. Communications of the ACM 43(12): 73-79, 2000. Type: Article
Oct 1 2001
Electronic commerce relationships: trust by design
Keen P., Ballance G., Chan S., Schrump S., Prentice Hall PTR, Upper Saddle River, NJ, 2000.  249, Type: Book (9780130170378)
Feb 1 2000
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy