Using Secure DisCSP Solvers for Generalized Vickrey Auctions∗ Complete and Stochastic Secure Techniques

نویسنده

  • Marius C. Silaghi
چکیده

Within incentive auctions, several bidders cooperate for clearing a set of offers or requests formalized by an auctioneer, ensuring that each participant cannot do better than by inputing his true utility. We use a distributed weighted constraint satisfaction (DisWCSP) framework where the actual constraints are secrets that are not known by any agent. They are defined by a set of functions on the secret inputs from all agents. The solution is also kept secret and each agent learns just the result of applying an agreed function on the solution. We show how to apply this framework for modeling and solving General Vickrey Auctions (GVAs). Solutions based on secure complete algorithms as well as solutions using faster secure stochastic algorithms are proposed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Generalized Vickrey Auction without Third-party Servers

This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Combinatorial auctions, in which multiple goods are sold simultaneously, have recently attracted considerable attention. The GVA can handle combinatorial auctions and has good theoretical characteristics such as incentiv...

متن کامل

Cryptographic Protocols for Secure Second-Price Auctions

In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not least electronic commerce. In many cases the Vickrey (second-price sealed-bid) auction is used as a protocol that prescribes how the individual agents have to interact in order to come to an agreement. The main reasons for...

متن کامل

A Web-Based Meeting Scheduling Solver With Privacy Guarantees, Without Trusted Servers

Some problems having privacy requirements can be modeled with distributed (weighted) constraint satisfaction frameworks [3]. Previous approaches to such problems used trusted servers or some kind of argumentation, inherently leaking data about the secret constraints [5]. We developed techniquespatent pending and a system for solving these problems where an agent does not divulge absolutely any ...

متن کامل

Secure Multi-attribute Procurement Auction

In this paper, we develop a secure multi-attribute procurement auction, in which a sales item is defined by several attributes called qualities, the buyer is the auctioneer (e.g., a government), and the sellers are the bidders. We first present a Vickrey-type protocol that can be used for multi-attribute procurement auctions. Next, we show how this protocol can be executed securely. key words :...

متن کامل

Electronic Auctions with Private Bids

Auctions are a fundamental electronic commerce technology. We describe a set of protocols for performing sealed-bid electronic auctions which preserve the privacy of the submitted bids using a form of secure distributed computation. Bids are never revealed to any party, even after the auction is completed. Both rst-price and second-price (Vickrey) auctions are supported, and the computational c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005