In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems. In essence this paper is an overview of the research project SCET--Secure Computing, Economy, and Trust-- which attempts to build auctions for real applications using secure multiparty computation. The main contributions of this project are: A generic setup for secure evaluation of integer arithmetic including comparisons; general double auctions expressed by such operations; a real world double auction tailored to the complexity and performance of the basic primitives '+' an...
Online auctions are inherently insecure and there exist many opportunities for participants to cheat...
We discuss the widely increasing range of applications of a cryptographic technique called Multi-Par...
We propose a protocol for secure comparison of integers based on homomorphic encryption.We also prop...
In this paper we consider the problem of constructing secure auctions based on techniques from moder...
We study the problem of securely building single-commodity multi-markets auction mechanisms. We intr...
Abstract This work describes the design and implementation of an auction system using secure multipa...
An auction is a simple way of selling and buying goods. Modern auction protocols often rely on compl...
International audienceAn auction is a simple way of selling and buying goods. Modern auction protoco...
We introduce a robust framework that allows for cryptographically secure multiparty computations, su...
Abstract. An auction is a simple way of selling and buying goods. Modern auc-tion protocols often re...
An auction is a simple way of selling and buying goods. Modern auction protocols often rely on compl...
Auctions have become an important part of electronic commerce. Considering the gradually increasing ...
We present a practical protocol based on homomorphic cryptography for conducting provably fair seale...
Secure multi-party computation is a problem where a number of parties want to compute a function of ...
Enhancing e-commerce security through computing technology alone is not sufficient. E-commerce desig...
Online auctions are inherently insecure and there exist many opportunities for participants to cheat...
We discuss the widely increasing range of applications of a cryptographic technique called Multi-Par...
We propose a protocol for secure comparison of integers based on homomorphic encryption.We also prop...
In this paper we consider the problem of constructing secure auctions based on techniques from moder...
We study the problem of securely building single-commodity multi-markets auction mechanisms. We intr...
Abstract This work describes the design and implementation of an auction system using secure multipa...
An auction is a simple way of selling and buying goods. Modern auction protocols often rely on compl...
International audienceAn auction is a simple way of selling and buying goods. Modern auction protoco...
We introduce a robust framework that allows for cryptographically secure multiparty computations, su...
Abstract. An auction is a simple way of selling and buying goods. Modern auc-tion protocols often re...
An auction is a simple way of selling and buying goods. Modern auction protocols often rely on compl...
Auctions have become an important part of electronic commerce. Considering the gradually increasing ...
We present a practical protocol based on homomorphic cryptography for conducting provably fair seale...
Secure multi-party computation is a problem where a number of parties want to compute a function of ...
Enhancing e-commerce security through computing technology alone is not sufficient. E-commerce desig...
Online auctions are inherently insecure and there exist many opportunities for participants to cheat...
We discuss the widely increasing range of applications of a cryptographic technique called Multi-Par...
We propose a protocol for secure comparison of integers based on homomorphic encryption.We also prop...