搜索结果: 1-7 共查到“军事学 Auctions”相关记录7条 . 查询时间(0.065 秒)
An Improved Protocol for Securely Solving the Shortest Path Problem and its Application to Combinatorial Auctions
secure multi-party computation applied cryptography shortest path problem
2017/10/9
We propose a protocol to securely compute the solution to the (single source) Shortest Path Problem, based on Dijkstra's algorithm and Secure Multiparty Computation. Our protocol improves state of the...
Practically Efficient Secure Single-Commodity Multi-Market Auctions
applied cryptography secure multiparty computation electricity markets
2017/5/23
We study the problem of securely building single-commodity multi-markets auction mechanisms. We introduce a novel greedy algorithm and its corresponding privacy preserving implementation using secure ...
Secure Second Price Auctions with a Rational Auctioneer
Auctions Cryptographic Auction Schemes
2014/3/13
We present novel security requirements for second price auctions and a simple, efficient and practical protocol that provably maintains these requirements. Novel requirements are needed because common...
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Secure Computation Garbled Circuit Millionaires Problem Auctions
2009/9/2
We consider generic Garbled Circuit (GC)-based techniques
for Secure Function Evaluation (SFE) in the semi-honest model.
We describe efficient GC constructions for addition, subtraction, multiplicat...
Privacy-Enhancing First-Price Auctions Using Rational Cryptography
Privacy-Enhancing First-Price Auctions Rational Cryptography
2009/6/9
We consider enhancing a sealed-bid single-item auction with privacy concerns, our assumption
being that bidders primarily care about monetary payoff and secondarily worry about exposing
information ...
A correction to“Efficient and Secure Comparison for On-Line Auctions”
cryptosystem On-Line Auctions secure
2009/6/5
In this note, we describe a correction to the cryptosystem
proposed in [1, 2]. Although the correction is small and does not af-
fect the performance of the protocols from [1, 2], it is necessary as...
Secure Vickrey Auctions without Threshold Trust
cryptographic auction schemes homomorphic encryption range proofs
2009/4/16
We argue that threshold trust is not an option in most of the reallife
electronic auctions.We then propose two new cryptographic Vickrey auction
schemes that involve, apart from the bidders and the ...