1. Abe, M., Suzuki, K.: M+1-st price auction using homomorphic encryption. In: Proceedings of the 5th International Conference on Public Key Cryptography (PKC). Lecture Notes in Computer Science (LNCS), vol. 2274, pp. 115–224. Springer, Berlin Heidelberg New York (2002)
2. Baudron, O., Stern, J.: Non-interactive private auctions. In: Proceedings of the 5th Annual Conference on Financial Cryptography (FC). Lecture Notes in Computer Science (LNCS), vol. 2339, pp. 300–313. Springer, Berlin Heidelberg New York (2001)
3. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC), pp. 1–10. ACM, New York (1988)
4. Brandt, F.: Secure and private auctions without auctioneers. Tech. Rep. FKI-245-02, Department for Computer Science, Technical University of Munich, Munich (2002). ISSN 0941-6358
5. Brandt, F.: A verifiable, bidder-resolved auction protocol. In: Falcone, R., Barber, S., Korba, L., Singh, M. (eds.) Proceedings of the 5th AAMAS Workshop on Deception, Fraud and Trust in Agent Societies (Special Track on Privacy and Protection with Multi-Agent Systems), pp. 18–25 (2002)