Please use this identifier to cite or link to this item: https://ir.iimcal.ac.in:8443/jspui/handle/123456789/1742
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDe, Sourya Joyee
dc.contributor.authorPal, Asim Kumar
dc.date.accessioned2021-08-26T06:23:48Z-
dc.date.available2021-08-26T06:23:48Z-
dc.date.issued2013
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84893115536&doi=10.1007%2f978-3-642-45204-8_7&partnerID=40&md5=c772d7b9715a0c7229a332c8706a81cb
dc.identifier.urihttps://ir.iimcal.ac.in:8443/jspui/handle/123456789/1742-
dc.descriptionDe, Sourya Joyee, Management Information Systems Group, Indian Institute of Management Calcutta, India; Pal, Asim Kumar., Management Information Systems Group, Indian Institute of Management Calcutta, India
dc.descriptionISSN/ISBN - 03029743
dc.descriptionpp.91-105
dc.descriptionDOI - 10.1007/978-3-642-45204-8_7
dc.description.abstractSecurity of various types of online auctions has received a considerable attention from researchers. However, very few works have analyzed the problem of security in online sealed-bid auctions from the point of view of rational participants. The paper deals with an online auction scenario where two types of participants co-exist: 1) a party corrupted by a rational adversary that have positive utilities from information gained and that has no valuation for the items on auction enabling them to bid arbitrarily and 2) rational parties that are privacy conscious, positively value information gain and have a valuation for items on auction. The secure auction protocol proposed here addresses 1) privacy concerns of the rational players from themselves as well as the rational adversary; 2) prevention of 'throwing away' of contracts by rational adversaries and 3) prevention of sellers from obtaining their copy of the contract while winners do not receive theirs. © 2013 Springer-Verlag.
dc.publisherSCOPUS
dc.publisherLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.relation.ispartofseries8303 LNCS
dc.subjectSecret Sharing
dc.subjectSequential Equilibrium
dc.subjectSecure Computation
dc.titleAuctions with rational adversary
dc.typeConference Paper
Appears in Collections:Management Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.