Cryptographic Combinatorial Clock-Proxy Auctions
MetadataShow full item record
CitationParkes, David C., Michael O. Rabin, and Christopher Thorpe. 2009. Cryptographic combinatorial clock-proxy auctions. In Financial Cryptography and Data Security, ed. R. Dingledine, P. Golle, 305-324. Berlin: Springer. Previously published in Lecture Notes In Computer Science 5628: 305-324.
AbstractWe present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The "clock phase" functions as a trusted auction despite price discovery: bidders submit encrypted bids, and prove for themselves that they meet activity rules, and can compute total demand and thus verify price increases without revealing any information about individual demands. In the sealed-bid "proxy phase", all bids are revealed the auctioneer via time-lapse cryptography and a branch-and-bound algorithm is used to solve the winner-determination problem. Homomorphic encryption is used to prove the correctness of the solution, and establishes the correctness of the solution to any interested party. Still an NP-hard optimization problem, the use of homomorphic encryption imposes additional computational time on winner-determination that is linear in the size of the branch-and-bound search tree, and thus roughly linear in the original (search-based) computational time. The result is a solution that avoids, in the usual case, the exponential complexity of previous cryptographically-secure combinatorial auctions.
Citable link to this pagehttp://nrs.harvard.edu/urn-3:HUL.InstRepos:4000813
- FAS Scholarly Articles