Detailed Information

Cited 4 time in webofscience Cited 0 time in scopus
Metadata Downloads

Protocol completion incentive problems in cryptographic Vickrey auctions

Full metadata record
DC Field Value Language
dc.contributor.authorBradford, Phillip G.-
dc.contributor.authorPark, Sunju-
dc.contributor.authorRothkopf, Michael H.-
dc.contributor.authorPark, Heejin-
dc.date.accessioned2022-10-07T10:19:52Z-
dc.date.available2022-10-07T10:19:52Z-
dc.date.created2022-08-26-
dc.date.issued2008-06-
dc.identifier.issn1389-5753-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/172021-
dc.description.abstractDespite attractive theoretical properties, Vickrey auctions are seldom used due to the risk of information revelation and fear of cheating. CVAs (Cryptographic Vickrey Auctions) have been proposed to protect bidders' privacy or to prevent cheating by the bid taker. This paper focuses on incentive issues for certain CVAs. First, it defines the CVAs of interest and identifies ideal goals for this class of CVAs. One of the criteria identifies an incentive problem that is new to the literature on CVAs, the disincentive of bidders to complete the protocol once they have learned that they lost the auction. Any auction protocol that requires losing bidders to do additional work after learning they have lost the auction must provide the losers with proper incentives to follow the protocol. Second, this paper shows that for a class of CVAs, some losers must continue to participate even though they know they have lost. Finally, it describes two new CVA protocols that solve the protocol-completion incentive problem. Both protocols use bidder-bidder comparisons based on a modified Yao's Millionaires' protocol. The first protocol performs O(n(2)) bidder-bidder comparisons, while the second protocol performs O(n) comparisons.-
dc.language영어-
dc.language.isoen-
dc.publisherSPRINGER-
dc.titleProtocol completion incentive problems in cryptographic Vickrey auctions-
dc.typeArticle-
dc.contributor.affiliatedAuthorPark, Heejin-
dc.identifier.doi10.1007/s10660-008-9013-1-
dc.identifier.scopusid2-s2.0-44249092751-
dc.identifier.wosid000207794400003-
dc.identifier.bibliographicCitationELECTRONIC COMMERCE RESEARCH, v.8, no.1-2, pp.57 - 77-
dc.relation.isPartOfELECTRONIC COMMERCE RESEARCH-
dc.citation.titleELECTRONIC COMMERCE RESEARCH-
dc.citation.volume8-
dc.citation.number1-2-
dc.citation.startPage57-
dc.citation.endPage77-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaBusiness & Economics-
dc.relation.journalWebOfScienceCategoryBusiness-
dc.relation.journalWebOfScienceCategoryManagement-
dc.subject.keywordPlusCOMPUTATION-
dc.subject.keywordAuthorCryptographic Vickrey actions-
dc.subject.keywordAuthorBidder incentives-
dc.subject.keywordAuthorYao&apos-
dc.subject.keywordAuthors millionaires&apos-
dc.subject.keywordAuthorprotocol-
dc.identifier.urlhttps://link.springer.com/article/10.1007/s10660-008-9013-1-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Park, Hee jin photo

Park, Hee jin
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE