Secure Auctions without Cryptography.
Jannik DreierHugo JonkerPascal LafourcadePublished in: FUN (2014)
Keyphrases
- cellular automata
- cryptographic protocols
- public key cryptography
- information security
- cryptographic algorithms
- security issues
- security requirements
- security level
- online auctions
- resource allocation
- key management
- public key
- multi attribute
- mechanism design
- bidding strategies
- user authentication
- information revelation
- group buying
- marginal utility
- data encryption
- information systems
- standard model
- combinatorial auctions
- intrusion detection
- special case