TY - GEN
T1 - Secure computation for combinatorial auctions and market exchanges
AU - Nzouonta, Josiane
AU - Silaghi, Marius Cǎlin
AU - Yokoo, Makoto
PY - 2004
Y1 - 2004
N2 - It was recently shown possible to solve (M+1) st price single item auctions without revealing absolutely any secret except for the solution. Namely, with vMB-share [2], the seller and the buyer only learn each other's identity and learn the selling price for a chosen (M+1) st pricing scheme. No trusted party is necessary. In this paper we show how vMB-share can be extended for the clearing of combinatorial negotiation problems with several items, buyers and sellers. We first show how the more general problem can be reduced to a virtual form, form that is relatively similar to the single item auctions, by having a virtual bidder for each candidate allocation. Then, some modifications in the cryptographic techniques of vMB-share are made such that it can offer a solution to problems in virtual form. As explained in the paper, it is expected that a secure solution hiding details that can be inferred from the running time will have an exponential computation cost. Our preliminary experimental evaluation shows that some small negotiations can nevertheless be solved with acceptable effort.
AB - It was recently shown possible to solve (M+1) st price single item auctions without revealing absolutely any secret except for the solution. Namely, with vMB-share [2], the seller and the buyer only learn each other's identity and learn the selling price for a chosen (M+1) st pricing scheme. No trusted party is necessary. In this paper we show how vMB-share can be extended for the clearing of combinatorial negotiation problems with several items, buyers and sellers. We first show how the more general problem can be reduced to a virtual form, form that is relatively similar to the single item auctions, by having a virtual bidder for each candidate allocation. Then, some modifications in the cryptographic techniques of vMB-share are made such that it can offer a solution to problems in virtual form. As explained in the paper, it is expected that a secure solution hiding details that can be inferred from the running time will have an exponential computation cost. Our preliminary experimental evaluation shows that some small negotiations can nevertheless be solved with acceptable effort.
UR - http://www.scopus.com/inward/record.url?scp=4544281930&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=4544281930&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:4544281930
SN - 1581138644
SN - 9781581138641
T3 - Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2004
SP - 1398
EP - 1399
BT - Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2004
A2 - Jennings, N.R.
A2 - Sierra, C.
A2 - Sonenberg, L.
A2 - Tambe, M.
T2 - Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2004
Y2 - 19 July 2004 through 23 July 2004
ER -