Publication: Cryptographic Combinatorial Clock-Proxy Auctions
Open/View Files
Date
2009
Published Version
Journal Title
Journal ISSN
Volume Title
Publisher
Springer Verlag
The Harvard community has made this article openly available. Please share how this access benefits you.
Citation
Parkes, David C., Michael O. Rabin, and Christopher Thorpe. 2009. Cryptographic combinatorial clock-proxy auctions. In Financial Cryptography and Data Security, ed. R. Dingledine, P. Golle, 305-324. Berlin: Springer. Previously published in Lecture Notes In Computer Science 5628: 305-324.
Research Data
Abstract
We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The "clock phase" functions as a trusted auction despite price discovery: bidders submit encrypted bids, and prove for themselves that they meet activity rules, and can compute total demand and thus verify price increases without revealing any information about individual demands. In the sealed-bid "proxy phase", all bids are revealed the auctioneer via time-lapse cryptography and a branch-and-bound algorithm is used to solve the winner-determination problem. Homomorphic encryption is used to prove the correctness of the solution, and establishes the correctness of the solution to any interested party. Still an NP-hard optimization problem, the use of homomorphic encryption imposes additional computational time on winner-determination that is linear in the size of the branch-and-bound search tree, and thus roughly linear in the original (search-based) computational time. The result is a solution that avoids, in the usual case, the exponential complexity of previous cryptographically-secure combinatorial auctions.
Description
Other Available Sources
Keywords
Terms of Use
This article is made available under the terms and conditions applicable to Other Posted Material (LAA), as set forth at Terms of Service