Jonker, Hugo ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Lafourcade, P.
External co-authors :
no
Language :
English
Title :
Secure Auctions Without Cryptography
Publication date :
2014
Event name :
7th conference on Fun with Algorithms (FUN'14)
Event date :
01-07-2014 to 03-07-2014
Audience :
International
Main work title :
7th conference on Fun with Algorithms (FUN'14), Lipari Island, Sicily, Italy, July 1--3, 2014
Omote, K., Miyaji, A.: A practical english auction with one-time registration. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 221-234. Springer, Heidelberg (2001) (Pubitemid 33305145)
Lipmaa, H., Asokan, N., Niemi, V.: Secure vickrey auctions without threshold trust. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 87-101. Springer, Heidelberg (2003) (Pubitemid 36316773)
Stubblebine, S.G., Syverson, P.F.: Fair on-line auctions without special trusted parties. In: Franklin, M. (ed.) FC 1999. LNCS, vol. 1648, pp. 230-240. Springer, Heidelberg (1999)
Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: Proc. 1st ACM Conference on Electronic Commerce, pp. 129-139 (1999)
Sako, K.: An auction protocol which hides bids of losers. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 422-432. Springer, Heidelberg (2000)
Brandt, F.: How to obtain full privacy in auctions. International Journal of Information Security 5, 201-216 (2006)
Dreier, J., Dumas, J.-G., Lafourcade, P.: Brandt's fully private auction protocol revisited. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 88-106. Springer, Heidelberg (2013)
Bundesverfassungsgericht (Germany's Federal Constitutional Court): Use of voting computers in 2005 bundestag election unconstitutional, http://www.bundesverfassungsgericht.de/en/press/bvg09-019en.html (press release 19, 2009)
Stajano, F., Anderson, R.: The cocaine auction protocol: On the power of anonymous broadcast. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 434-447. Springer, Heidelberg (2000)
Moran, T., Naor, M.: Polling with physical envelopes: A rigorous analysis of a human-centric protocol. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 88-108. Springer, Heidelberg (2006) (Pubitemid 44072235)
Izmalkov, S., Lepinski, M., Micali, S.: Perfect implementation. Games and Economic Behavior 71(1), 121-140 (2011)
Fagin, R., Naor, M., Winkler, P.: Comparing information without leaking it. Commun. ACM 39(5), 77-85 (1996)
Schneier, B.: The solitaire encryption algorithm (1999), http://www.schneier.com/solitaire.html
Dreier, J., Jonker, H.L., Lafourcade, P.: Defining verifiability in e-auction protocols. In: Proc. ASIACCS 2013, pp. 547-552. ACM (2013)
Dreier, J., Lafourcade, P., Lakhnech, Y.: Formal verification of e-auction protocols. In: Basin, D., Mitchell, J.C. (eds.) POST 2013. LNCS, vol. 7796, pp. 247-266. Springer, Heidelberg (2013)
Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: Proc. 14th Computer Security Foundations Workshop (CSFW2014), pp. 82-96. IEEE (June 2001)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) Advances in Cryptology - CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and publickey cryptosystems. Commun. ACM 21(2), 120-126 (1978)
Dreier, J., Jonker, H., Lafourcade, P.: Secure auctions without cryptography, extended version (2014), http://dx.doi.org/10.3929/ethz-a- 010127116