On the Existence of Unconditionally Privacy-Preserving Auction Protocols
-
Published:2008-03
Issue:2
Volume:11
Page:1-21
-
ISSN:1094-9224
-
Container-title:ACM Transactions on Information and System Security
-
language:en
-
Short-container-title:ACM Trans. Inf. Syst. Secur.
Author:
Brandt Felix1,
Sandholm Tuomas2
Affiliation:
1. University of Munich
2. Carnegie Mellon University
Abstract
We investigate whether it is possible to preserve privacy in sealed-bid auctions to a maximal extent. In particular, this paper focuses on <it>unconditional full privacy</it>, i.e., privacy that relies neither on trusted third parties (like auctioneers), nor on computational intractability assumptions (like the hardness of factoring). These constraints imply a scenario in which bidders exchange messages according to some predefined protocol in order to jointly determine the auction outcome without revealing any additional information. It turns out that the first-price sealed-bid auction can be emulated by an unconditionally fully private protocol. However, the protocol's round complexity is exponential in the bid size, and there is no more efficient protocol. On the other hand, we prove the impossibility of privately emulating the second-price sealed-bid auction for more than two bidders. This impossibility holds even when relaxing various privacy constraints such as allowing the revelation of all but one losing bid (while maintaining anonymity) or allowing the revelation of the second highest bidder's identity.
Funder
Deutsche Forschungsgemeinschaft
National Science Foundation
Division of Information and Intelligent Systems
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference38 articles.
1. Bar-Yehuda R. Chor B. and Kushilevitz E. 1990. Privacy additional information and communication. In <it>Proceedings of the 5th IEEE Conference on Structure in Complexity Theory</it>. 55--65. Bar-Yehuda R. Chor B. and Kushilevitz E. 1990. Privacy additional information and communication. In <it>Proceedings of the 5th IEEE Conference on Structure in Complexity Theory</it>. 55--65.
2. Ben-Or M. Goldwasser S. and Wigderson A. 1988. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In <it>Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC'88)</it>. ACM Press 1--10. 10.1145/62212.62213 Ben-Or M. Goldwasser S. and Wigderson A. 1988. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In <it>Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC'88)</it>. ACM Press 1--10. 10.1145/62212.62213
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献