M+1-st Price Auction Using Homomorphic Encryption(Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
This paper provides a M + 1-st price auction scheme using homomorphic encryption and the mix and match technique; it offers secrecy of bidding price and public verifiability. Our scheme has low round communication complexity: 1 round from each bidder to auctioneer in bidding and log p rounds from auctioneer to trusted authority in opening when prices are selected from p prefixed choices.
- 社団法人電子情報通信学会の論文
- 2003-01-01
著者
-
SUZUKI Koutarou
NTT Information Sharing Platform Laboratories, NTT Corporation
-
Suzuki Koutarou
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Abe Masayuki
Ntt Information Sharing Platform Laboratories
関連論文
- Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications(Protocols,Cryptography and Information Security)
- Generalized Vickrey Auction and Suppression of Active Adversary Using Incentive-Compatible Implementation(Application)(Cryptography and Information Security)
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions(Protocol, Cryptography and Information Security)
- Tag-KEM from Set Partial Domain One-Way Permutations
- Flexible-Routing Anonymous Networks Using Optimal Length of Ciphertext(Application)(Cryptography and Information Security)
- Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
- 1-out-of-n Signatures from a Variety of Keys (Asymmetric Cipher) (Cryptography and Information Security)
- Traceable Ring Signature
- M+1-st Price Auction Using Homomorphic Encryption(Special Section on Cryptography and Information Security)
- Lenient/Strict Batch Verification in Several Groups(Special Section on Cryptography and Information Security)
- Delegation Chains Secure up to Constant Length(Special Section on Cryptography and Information Security)
- Universally Verifiable Mix-Net with Verification Work Independent of the Number of Mix-Servers
- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
- Strongly Secure Predicate-Based Authenticated Key Exchange : Definition and Constructions
- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange