Please use this identifier to cite or link to this item:
https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1742
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | De, Sourya Joyee | |
dc.contributor.author | Pal, Asim Kumar | |
dc.date.accessioned | 2021-08-26T06:23:48Z | - |
dc.date.available | 2021-08-26T06:23:48Z | - |
dc.date.issued | 2013 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84893115536&doi=10.1007%2f978-3-642-45204-8_7&partnerID=40&md5=c772d7b9715a0c7229a332c8706a81cb | |
dc.identifier.uri | https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1742 | - |
dc.description | De, Sourya Joyee, Management Information Systems Group, Indian Institute of Management Calcutta, India; Pal, Asim Kumar., Management Information Systems Group, Indian Institute of Management Calcutta, India | |
dc.description | ISSN/ISBN - 03029743 | |
dc.description | pp.91-105 | |
dc.description | DOI - 10.1007/978-3-642-45204-8_7 | |
dc.description.abstract | Security of various types of online auctions has received a considerable attention from researchers. However, very few works have analyzed the problem of security in online sealed-bid auctions from the point of view of rational participants. The paper deals with an online auction scenario where two types of participants co-exist: 1) a party corrupted by a rational adversary that have positive utilities from information gained and that has no valuation for the items on auction enabling them to bid arbitrarily and 2) rational parties that are privacy conscious, positively value information gain and have a valuation for items on auction. The secure auction protocol proposed here addresses 1) privacy concerns of the rational players from themselves as well as the rational adversary; 2) prevention of 'throwing away' of contracts by rational adversaries and 3) prevention of sellers from obtaining their copy of the contract while winners do not receive theirs. © 2013 Springer-Verlag. | |
dc.publisher | SCOPUS | |
dc.publisher | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.relation.ispartofseries | 8303 LNCS | |
dc.subject | Secret Sharing | |
dc.subject | Sequential Equilibrium | |
dc.subject | Secure Computation | |
dc.title | Auctions with rational adversary | |
dc.type | Conference Paper | |
Appears in Collections: | Management Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.