Using Secure DisCSP Solvers for Generalized Vickrey Auctions∗ Complete and Stochastic Secure Techniques
نویسنده
چکیده
Within incentive auctions, several bidders cooperate for clearing a set of offers or requests formalized by an auctioneer, ensuring that each participant cannot do better than by inputing his true utility. We use a distributed weighted constraint satisfaction (DisWCSP) framework where the actual constraints are secrets that are not known by any agent. They are defined by a set of functions on the secret inputs from all agents. The solution is also kept secret and each agent learns just the result of applying an agreed function on the solution. We show how to apply this framework for modeling and solving General Vickrey Auctions (GVAs). Solutions based on secure complete algorithms as well as solutions using faster secure stochastic algorithms are proposed.
منابع مشابه
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Combinatorial auctions, in which multiple goods are sold simultaneously, have recently attracted considerable attention. The GVA can handle combinatorial auctions and has good theoretical characteristics such as incentiv...
متن کاملCryptographic Protocols for Secure Second-Price Auctions
In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not least electronic commerce. In many cases the Vickrey (second-price sealed-bid) auction is used as a protocol that prescribes how the individual agents have to interact in order to come to an agreement. The main reasons for...
متن کاملA Web-Based Meeting Scheduling Solver With Privacy Guarantees, Without Trusted Servers
Some problems having privacy requirements can be modeled with distributed (weighted) constraint satisfaction frameworks [3]. Previous approaches to such problems used trusted servers or some kind of argumentation, inherently leaking data about the secret constraints [5]. We developed techniquespatent pending and a system for solving these problems where an agent does not divulge absolutely any ...
متن کاملSecure Multi-attribute Procurement Auction
In this paper, we develop a secure multi-attribute procurement auction, in which a sales item is defined by several attributes called qualities, the buyer is the auctioneer (e.g., a government), and the sellers are the bidders. We first present a Vickrey-type protocol that can be used for multi-attribute procurement auctions. Next, we show how this protocol can be executed securely. key words :...
متن کاملElectronic Auctions with Private Bids
Auctions are a fundamental electronic commerce technology. We describe a set of protocols for performing sealed-bid electronic auctions which preserve the privacy of the submitted bids using a form of secure distributed computation. Bids are never revealed to any party, even after the auction is completed. Both rst-price and second-price (Vickrey) auctions are supported, and the computational c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005