Wu Qianhong, Wang Changjie, Chen Xiaofeng, Wang Yu-Min
{"title":"公开可验证的拍卖,泄漏最小","authors":"Wu Qianhong, Wang Changjie, Chen Xiaofeng, Wang Yu-Min","doi":"10.1109/CMPSAC.2004.1342867","DOIUrl":null,"url":null,"abstract":"Publicly verifiable sealed electronic auctions are proposed. The schemes enjoy the following advantages. They require no special trusted parties. After bid opening phase, only the winning price is revealed and the relation of other bidding amounts keep unknown. The winning price is publicly verifiable. Our scheme supports the first-price auction, Vickrey auction and (M+l)st-price auction. Finally, the first-price auction is very efficient and the generic (M+l)st-price auction is applicable when a high standard of security is required.","PeriodicalId":355273,"journal":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","volume":"308 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Publicly verifiable auctions with minimal leakage\",\"authors\":\"Wu Qianhong, Wang Changjie, Chen Xiaofeng, Wang Yu-Min\",\"doi\":\"10.1109/CMPSAC.2004.1342867\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Publicly verifiable sealed electronic auctions are proposed. The schemes enjoy the following advantages. They require no special trusted parties. After bid opening phase, only the winning price is revealed and the relation of other bidding amounts keep unknown. The winning price is publicly verifiable. Our scheme supports the first-price auction, Vickrey auction and (M+l)st-price auction. Finally, the first-price auction is very efficient and the generic (M+l)st-price auction is applicable when a high standard of security is required.\",\"PeriodicalId\":355273,\"journal\":{\"name\":\"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.\",\"volume\":\"308 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-09-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMPSAC.2004.1342867\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMPSAC.2004.1342867","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Publicly verifiable sealed electronic auctions are proposed. The schemes enjoy the following advantages. They require no special trusted parties. After bid opening phase, only the winning price is revealed and the relation of other bidding amounts keep unknown. The winning price is publicly verifiable. Our scheme supports the first-price auction, Vickrey auction and (M+l)st-price auction. Finally, the first-price auction is very efficient and the generic (M+l)st-price auction is applicable when a high standard of security is required.