Author:
Alvarez Ramiro,Nojoumian Mehrdad
Publisher
Springer International Publishing
Reference28 articles.
1. Abe, M., Suzuki, K.: M+ 1-st price auction using homomorphic encryption. In: International Workshop on Public Key Cryptography, pp. 115–124. Springer (2002)
2. Alvarez, R., Nojoumian, M.: Comprehensive survey on privacy-preserving protocols for sealed-bid auctions. Comput. Secur. (C&S) 88, 101502–101515 (2020)
3. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing. pp. 1–10. ACM (1988)
4. Boyar, J., Chaum, D., Damgård, I., Pedersen, T.: Convertible undeniable signatures. In: Conference on the Theory and Application of Cryptography, pp. 189–205. Springer (1990)
5. Brandt, F.: A verifiable, bidder-resolved auction protocol. In: Proceedings of the 5th International Workshop on Deception, Fraud and Trust in Agent Societies, SI on Privacy and Protection with Multi-Agent Systems, pp. 18–25 (2002)