Title :
Implementation and analysis of Dutch-style sealed-bid auctions computational vs unconditional security
Author :
Sriram Krishnamachari;Mehrdad Nojoumian;Kemal Akkaya
Author_Institution :
Department of Computer Science, Southern Illinois University Carbondale, Illinois, U.S.A
Abstract :
Designing a sealed-bid auction protocol is a challenging problem in the field of applied cryptography. In the last couple of decades, numerous protocols have been proposed in the literature where each one has its own property in terms of the security model, communication and computation complexities. To the best of our knowledge, there has been no study to implement and compare a similar class of sealed-bid auction protocols. This paper therefore implements and evaluates five different Dutch-style sealed-bid auction protocols, of which three protocols are computationally secure and two protocols are unconditionally secure. It mainly focuses on the computational cost of the initialization and verification phases of these privacy-preserving protocols.
Keywords :
"Protocols","Encryption","Public key","Computational modeling","Privacy"
Conference_Titel :
Information Systems Security and Privacy (ICISSP), 2015 International Conference on