A Sealed-bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage

被引:2
|
作者
Chin, Kota [1 ,2 ]
Emura, Keita [2 ]
Omote, Kazumasa [1 ,2 ]
Sato, Shingo [3 ]
机构
[1] Univ Tsukuba, Tsukuba, Ibaraki, Japan
[2] Natl Inst Informat & Commun Technol, Koganei, Tokyo, Japan
[3] Yokohama Natl Univ, Yokohama, Kanagawa, Japan
关键词
Blockchain; Sealed-bid Auction; Price Hiding; Fund Binding; BLOCKCHAIN;
D O I
10.1109/Blockchain55522.2022.00062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an open-bid auction, a bidder can know the budgets of other bidders. Thus, a sealed-bid auction that hides bidding prices is desirable. However, in previous sealed-bid auction protocols, it has been difficult to provide a "fund binding" property, which would guarantee that a bidder has funds more than or equal to the bidding price and that the funds are forcibly withdrawn when the bidder wins. Thus, such protocols are vulnerable to false bidding. As a solution, many protocols employ a simple deposit method in which each bidder sends a deposit to a smart contract, which is greater than or equal to the bidding price, before the bidding phase. However, this deposit reveals the maximum bidding price, and it is preferable to hide this information. In this paper, we propose a sealed-bid auction protocol that provides a fund binding property. Our protocol not only hides the bidding price and a maximum bidding price, but also provides fund binding, simultaneously. For hiding the maximum bidding price, we pay attention to the fact that usual Ethereum transactions and transactions for sending funds to a one-time address have the same transaction structure, and it seems that they are indistinguishable. We discuss how much bidding transactions are hidden. We also employ DECO (Zhang et al,. CCS 2020) that proves the validity of the data to a verifier in which the data are taken from a source without showing the data itself. Finally, we give our implementation which shows transaction fees required and compare it to a sealed-bid auction protocol employing the simple deposit method.
引用
收藏
页码:398 / 405
页数:8
相关论文
共 50 条
  • [1] A Sealed-Bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage
    Chin, Kota
    Emura, Keita
    Sato, Shingo
    Omote, Kazumasa
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2024, E107D (05) : 615 - 624
  • [2] Bidding behaviors for a keyword auction in a sealed-bid environment
    Kamijo, Y.
    [J]. DECISION SUPPORT SYSTEMS, 2013, 56 : 371 - 378
  • [3] Which is more suitable for rare flowers, first-price sealed-bid auction or second-price sealed-bid auction?
    Wang, Yongming
    Xiang, Chen
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON MECHATRONICS AND AUTOMATION (IEEE ICMA 2014), 2014, : 2111 - 2116
  • [4] SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability
    Chen, Biwen
    Li, Xue
    Xiang, Tao
    Wang, Peng
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [5] Secure first-price sealed-bid auction scheme
    Guo Z.
    Fu Y.
    Cao C.
    [J]. EURASIP Journal on Information Security, 2017 (1)
  • [6] Efficient First-Price Sealed-Bid Auction Scheme
    Meng, Qian
    Ma, Jianfeng
    Chen, Kefei
    Miao, Yinbin
    Yang, Tengfei
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2021, 37 (03) : 635 - 652
  • [7] A sealed-bid auction that matches the English auction
    Perry, M
    Wolfstetter, E
    Zamir, S
    [J]. GAMES AND ECONOMIC BEHAVIOR, 2000, 33 (02) : 265 - 273
  • [8] Spiteful Bidding in Sealed-Bid Auctions
    Brandt, Felix
    Sandholm, Tuomas
    Shoham, Yoav
    [J]. 20TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2007, : 1207 - 1214
  • [9] Secure quantum sealed-bid auction
    Naseri, Mosayeb
    [J]. OPTICS COMMUNICATIONS, 2009, 282 (09) : 1939 - 1943
  • [10] A sealed-bid electronic marketplace bidding auction protocol by using ring signature
    Shi, Wenbo
    Jang, Injoo
    Yoo, Hyeong Seon
    [J]. ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1005 - 1009