Search
Now showing items 111-114 of 114
Cryptographic Securities Exchanges
(Springer Nature, 2007)
While transparency in financial markets should enhance liquidity, its exploitation by unethical and parasitic traders discourages others from fully embracing disclosure of their own information. Traders exploit both the ...
The price of selfish behavior in bilateral network formation
(2005)
Given a collection of selfish agents who wish to establish links to route traffic among themselves, the set of equilibrium network topologies may appear quite different from the centrally enforced optimum. We study the ...
Practical secrecy-preserving, verifiably correct and trustworthy auctions
(Elsevier, 2008)
We present a practical protocol based on homomorphic cryptography for conducting provably fair sealed-bid auctions. The system preserves the secrecy of the bids, even after the announcement of auction results, while also ...
Practical secrecy-preserving, verifiably correct and trustworthy auctions.
(Association for Computing Machinery, 2006)
We present a practical system for conducting sealed-bid auctions that preserves the secrecy of the bids while providing for verifiable correctness and trustworthiness of the auction. The auctioneer must accept all bids ...