ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Secure Auctions in the Presence of Rational Adversaries

Ganesh, C and Kanukurthi, B and Shankar, G (2022) Secure Auctions in the Presence of Rational Adversaries. In: ACM SIGSAC Conference on Computer and Communications Security (CCS ’22), 7 - 11 November 2022, Los Angeles, pp. 1173-1186.

[img] PDF
CCSS_2022.pdf - Published Version
Restricted to Registered users only

Download (1MB) | Request a copy
Official URL: https://doi.org/10.1145/3548606.3560706


Sealed bid auctions are used to allocate a resource among a set of interested parties. Traditionally, auctions need the presence of a trusted auctioneer to whom the bidders provide their private bid values. Existence of such a trusted party is not an assumption easily realized in practice. Generic secure computation protocols can be used to remove a trusted party. However, generic techniques result in inefficient protocols, and typically do not provide fairness-that is, a corrupt party can learn the output and abort the protocol thereby preventing other parties from learning the output. At CRYPTO 2009, Miltersen, Nielsen and Triandopoulos∼citeC:MilNieTri09, introduced the problem of building auctions that are secure against rational bidders. Such parties are modeled as self-interested agents who care more about maximizing their utility than about learning information about bids of other agents. To realize this, they put forth a novel notion of information utility and introduce a game-theoretic framework that helps analyse protocols while taking into account both information utility as well as monetary utility. Unfortunately, their construction makes use a of generic MPC protocol and, consequently, the authors do not analyze the concrete efficiency of their protocol. In this work, we construct the first concretely efficient and provably secure protocol for First Price Auctions in therational setting. Our protocol guarantees privacy, public verifiability and fairness. Inspired by∼citeC:MilNieTri09, we put forth a solution concept that we callPrivacy Enhanced Computational Weakly Dominant Strategy Equilibrium that captures parties' privacy and monetary concerns in the game theoretic context, and show that our protocol realizes this. We believe this notion to be of independent interest. Our protocol is crafted specifically for the use case of auctions, is simple, using off-the-shelf cryptographic components. Executing our auction protocol on commodity hardware with 30 bidders, with bids of length 10, our protocol runs to completion in 0.429s and has total communication of 82KB. © 2022 ACM.

Item Type: Conference Paper
Publication: Proceedings of the ACM Conference on Computer and Communications Security
Publisher: Association for Computing Machinery
Additional Information: The copyright for this article belongs to Association for Computing Machinery.
Keywords: Commerce; Game theory, Auction; Computation protocols; Game-theoretic; Information utility; Learn+; Protocol cans; Rational adversary; Sealed-bid auctions; Secure computation; Trusted party, Cryptography
Department/Centre: Division of Electrical Sciences > Computer Science & Automation
Date Deposited: 13 Jan 2023 10:36
Last Modified: 13 Jan 2023 10:36
URI: https://eprints.iisc.ac.in/id/eprint/79137

Actions (login required)

View Item View Item