IEEE INFOCOM 2014 - IEEE Conference on Computer Communications 2014
DOI: 10.1109/infocom.2014.6848057
|View full text |Cite
|
Sign up to set email alerts
|

PS-TRUST: Provably secure solution for truthful double spectrum auctions

Abstract: Abstract-Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions. However, revealing one's true valuation causes severe privacy disclosure to the auctioneer and other bidders. To make things worse, previous work on secure spectrum auctions does not provide adequate security. In this paper, based on TRUST, we propose PS-TRUST, a provably secure solution for truthful double spectrum auctions. Besi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 37 publications
(31 citation statements)
references
References 21 publications
(31 reference statements)
0
31
0
Order By: Relevance
“…Thus, this assumption is not always true. In other related works [6], [14], [34], the authors adopted the similar system architecture. They mainly focused on protecting bid privacy, but did not consider bidders' coverage/interference area privacy.…”
Section: B Dynamic Spectrum Auctionmentioning
confidence: 99%
“…Thus, this assumption is not always true. In other related works [6], [14], [34], the authors adopted the similar system architecture. They mainly focused on protecting bid privacy, but did not consider bidders' coverage/interference area privacy.…”
Section: B Dynamic Spectrum Auctionmentioning
confidence: 99%
“…In previous work, introduced a trust‐worthy party into the auction and then proposed secure McAfee‐based double auctions such that no party in the auction has the knowledge to obtain any sensitive information. The major difference between these two schemes is that employs the mechanisms of order preserving encryption and oblivious transfer while utilizes the Paillier cryptosystem. In , the authors masked the bidding prices with a vector of ciphertexts and ensured that the auctioneer can find the maximum value, randomize the bids, and charge the bidders securely based on homomorphic encryption.…”
Section: Related Workmentioning
confidence: 99%
“…In , the authors masked the bidding prices with a vector of ciphertexts and ensured that the auctioneer can find the maximum value, randomize the bids, and charge the bidders securely based on homomorphic encryption. However, , , and have drawbacks. In the auctioneer can know the bids of all buyer groups and their ranking order in the auctions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the current research works and literatures have studied revenue maximization auction [5], truthfulness guaranty auction [6][7][8], flexible auction [9], and so on. Spectrum auction has been widely discussed in literature [10,11].…”
Section: Introductionmentioning
confidence: 99%