How to obtain full privacy in auctions
From MaRDI portal
Publication:5492128
DOI10.1007/s10207-006-0001-yzbMath1312.94035OpenAlexW1984808769MaRDI QIDQ5492128
Publication date: 13 October 2006
Published in: International Journal of Information Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10207-006-0001-y
Related Items (4)
Anonymous sealed bid auction protocol based on a variant of the dining cryptographers' protocol ⋮ Trustworthy sealed-bid auction with low communication cost atop blockchain ⋮ Secure sealed-bid online auctions using discreet cryptographic proofs ⋮ Efficient VSS free of computational assumption
Cites Work
- Efficient signature generation by smart cards
- Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing
- A Two-Server, Sealed-Bid Auction Protocol
- Secure Vickrey Auctions without Threshold Trust
- Bounded-concurrent secure multi-party computation with a dishonest majority
- A public key cryptosystem and a signature scheme based on discrete logarithms
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
- Financial Cryptography
- Foundations of Cryptography
- Financial Cryptography and Data Security
- Computer Aided Verification
- Computer Aided Verification
- Computer Aided Verification
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: How to obtain full privacy in auctions