Securing Auctions using Cryptography Richard Barnes Cryptography Applications Bistro University of Virginia, March 16, 2004 Richard Barnes Cryptography.

Slides:



Advertisements
Similar presentations
Yossi Sheffi Mass Inst of Tech Cambridge, MA ESD.260J/1.260J/15.
Advertisements

E-Auctions. Electronic CommercePrentice Hall © Learning Objectives 1.Define the various types of e-auctions and list their characteristics. 2.Describe.
(Single-item) auctions Vincent Conitzer v() = $5 v() = $3.
Network Economics -- Lecture 4: Auctions and applications Patrick Loiseau EURECOM Fall 2012.
CPS Bayesian games and their use in auctions Vincent Conitzer
Chapter 25: Auctions and Auction Markets 1 Auctions and Auction Markets.
Auctions CS 886 Sept 29, Auctions Methods for allocating goods, tasks, resources... Participants: auctioneer, bidders Enforced agreement between.
Intermediate Microeconomics Midterm (50%) (4/27) Final (50%) (6/22) Term grades based on relative ranking. Mon 1:30-2:00 ( 社科 757)
An Approximate Truthful Mechanism for Combinatorial Auctions An Internet Mathematics paper by Aaron Archer, Christos Papadimitriou, Kunal Talwar and Éva.
Bidding Strategy and Auction Design Josh Ruffin, Dennis Langer, Kevin Hyland and Emmet Ferriter.
Auctions Auction types: –First price, sealed bid auction –Second price, sealed bid auction –English auction (ascending bid auction) –Dutch auction (descending.
Econ 805 Advanced Micro Theory 1 Dan Quint Fall 2007 Lecture 2 – Sept
Michael R. Baye, Managerial Economics and Business Strategy, 3e. ©The McGraw-Hill Companies, Inc., 1999 Managerial Economics & Business Strategy Chapter.
Internet Auction Presented by Ying Wang. §Introduction of Internet Auction §Different Internet Auction Methods §Internet Auction Software Design §Some.
Multi-item auctions with identical items limited supply: M items (M smaller than number of bidders, n). Three possible bidder types: –Unit-demand bidders.
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications Lecture 6 Auction Theory Zhu Han, Dusit Niyato, Walid Saad, Tamer.
On Cheating in Sealed-Bid Auctions Ryan Porter Yoav Shoham Computer Science Department Stanford University.
Chapter 10 E-Auctions.
Welcome Auctions Jonathan D. Wareham
Survey on e-Auction PresenterNguyen Hoang Anh NordSecMob.
Auctions An auction is a mechanism for trading items by means of bidding. Dates back to 500 BC where Babylonians auctioned of women as wives. Position.
1 Chapter 6: Auctions SCIT1003 Chapter 6: Auctions Prof. Tsang.
Private-value auctions: theory and experimental evidence (Part I) Nikos Nikiforakis The University of Melbourne.
Do software agents know what they talk about? Agents and Ontology dr. Patrick De Causmaecker, Nottingham, March
Auctions Ruth Tarrant. Classifying auctions What is the nature of the good being auctioned? What are the rules of bidding? Private value auction Common.
Auction Theory Class 3 – optimal auctions 1. Optimal auctions Usually the term optimal auctions stands for revenue maximization. What is maximal revenue?
SRIRAM KRISHNAMACHARI MEHRDAD NOJOUMIAN KEMAL AKKAYA SOUTHERN ILLINOIS UNIVERSITY CARBONDALE FLORIDA ATLANTIC UNIVERSITY FLORIDA INTERNATIONAL UNIVERSITY.
The Science of Networks 6.1 Today’s topics Game Theory Normal-form games Dominating strategies Nash equilibria Acknowledgements Vincent Conitzer, Michael.
Auctions. An auction is a process of buying and selling goods or services by offering them up for bid ( The price at which a buyer is willing to close.
Yang Cai Sep 24, An overview of today’s class Prior-Independent Auctions & Bulow-Klemperer Theorem General Mechanism Design Problems Vickrey-Clarke-Groves.
1 Teck-Hua Ho April 15, 2006 Auction Principles I. Economic and Behavioral Foundations of Pricing II. Innovative Pricing Concepts and Tools III. Internet.
1 Teck-Hua Ho April 18, 2006 Auction Design I. Economic and Behavioral Foundations of Pricing II. Innovative Pricing Concepts and Tools III. Internet Pricing.
Chapter Seventeen Auctions. Who Uses Auctions? u Owners of art, cars, stamps, machines, mineral rights etc. u Q: Why auction? u A: Because many markets.
1 Teck-Hua Ho April 22, 2006 Auction Design I. Economic and Behavioral Foundations of Pricing II. Innovative Pricing Concepts and Tools III. Internet Pricing.
VAMSEE KONERU PRADNYA SUTE
Auctions and dynamic pricing. When is the auction mechanism useful? We do not know the true value of the good or service on offer We do not know the true.
Outline  In-Class Experiment on First-Price Sealed-Bid Auctions  Professor John Morgan: Internet Auctions  The Winner’s Curse Hypothesis: Kagel and.
Auctioning one item PART 2 Tuomas Sandholm Computer Science Department Carnegie Mellon University.
Auctions Hal R. Varian. Auctions Auctions are very useful mean of price discovery eBay: everyone’s favorite example DoveBid: high value asset sales at.
Auctions and dynamic pricing. Taxonomy of auctions Single-sided: Single-sided: –English –Dutch –Japanese –Sealed bid.
Auctions Hal R. Varian. Auctions Auctions are very useful mean of price discovery eBay, everyone’s favorite example DoveBid, high value, not so well.
1 Teck-Hua Ho April 13, 2006 Next Class: Design of Auction Format  Dutch auction (D) (e.g, )  First-price sealed-bid.
and Lecture Notes in Game Theory1 Game Theory Applications: Lecture Notes Course Website u Galina.
1 Teck-Hua Ho April 13, 2006 Auction Principles I. Economic and Behavioral Foundations of Pricing II. Innovative Pricing Concepts and Tools III. Internet.
1 Teck-Hua Ho April 13, 2006 Auction Principles I. Economic and Behavioral Foundations of Pricing II. Innovative Pricing Concepts and Tools III. Internet.
Collusion and the use of false names Vincent Conitzer
Auctions Yunon Chuang. What are auctions? n Auction Markets: –traders transact directly against the orders of other traders by communication through a.
Introduction to Auctions David M. Pennock. Auctions: yesterday Going once, … going twice,...
KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY Sakurai Lab. Kyushu University Dr-course HER, Yong-Sork E-voting VS. E-auction.
©2003, Zoran Despotovic, EPFL-I&C, Laboratoire de systèmes d'informations répartis Double Auctioning in a P2P environment (an attempt) Zoran Despotovic.
Yang Cai Sep 8, An overview of the class Broad View: Mechanism Design and Auctions First Price Auction Second Price/Vickrey Auction Case Study:
Implementing e-Auctions with Sharemind Md. Sadek Ferdous 12th November 2008.
Combinatorial Auctions By: Shai Roitman
TRUST: A General Framework for Truthful Double Spectrum Auctions Xia Zhou Heather Zheng (University of California, Santa Barbara) Presenter: Emil Huang.
Auctions and Bidding. 2 Auction Theory Auction theory is important for practical reason empirical reason –testing-ground for economic theory, especially.
Auctions Shyam Sunder, Yale University Kozminski Academy Warsaw, June 22, 2013.
Auctions An auction is a mechanism for trading items by means of bidding. Dates back to 500 BC where Babylonians auctioned of women as wives. Position.
Steffen Staab 1WeST Web Science & Technologies University of Koblenz ▪ Landau, Germany Network Theory and Dynamic Systems Auctions.
Auctions serve the dual purpose of eliciting preferences and allocating resources between competing uses. A less fundamental but more practical reason.
Joshi, Sun, Vora Sumit Joshi, Yu-An Sun, Poorvi Vora The George Washington University The Privacy Cost of the Second Chance Offer.
Auctions Great Lakes Institute of Management, Chennai March 4, 2012.
6-1 Economics: Theory Through Applications. 6-2 This work is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 Unported License.
Advanced Subjects in GT Prepared by Rina Talisman Introduction Revenue Equivalence The Optimal Auction (Myerson 1981) Auctions.
Lecture 4 on Auctions Multiunit Auctions We begin this lecture by comparing auctions with monopolies. We then discuss different pricing schemes for selling.
Auctions Supplemental Material. In case you haven't noticed: Auctions are Everywhere! eBay → simple auctions for a single item AdWord Auctions → advertisers.
1 Types of Auctions English auction –ascending-price, open-outcry Dutch auction –descending-price, open-outcry 1 st price sealed bid auction –known as.
False-name Bids “The effect of false-name bids in combinatorial
Manoj Kumar, Stuart I. Feldman Presented by Bhaskaran Raman
Presentation transcript:

Securing Auctions using Cryptography Richard Barnes Cryptography Applications Bistro University of Virginia, March 16, 2004 Richard Barnes Cryptography Applications Bistro University of Virginia, March 16, 2004

Outline Context: Definitions and roles Types of auctions Vulnerabilities and Approaches Cryptographic solutions Adding security to a Vickrey Auction Adding security to a Combinatorial Auction Building in security into a novel mechanism Context: Definitions and roles Types of auctions Vulnerabilities and Approaches Cryptographic solutions Adding security to a Vickrey Auction Adding security to a Combinatorial Auction Building in security into a novel mechanism

Context Once upon a time: Bartering Unfamiliar or unknown buyers and sellers Multi-party price negotiation Auction: An organized way for many buyers and a seller to agree on a price goods. Once upon a time: Bartering Unfamiliar or unknown buyers and sellers Multi-party price negotiation Auction: An organized way for many buyers and a seller to agree on a price goods.

Types of Auctions English: Start low, bid up, highest bid wins. E.g: eBay, Sotheby’s Dutch: Starts high, auctioneer drops price, first to bid wins. (Can go multiple rounds or sealed) E.g: Salon IPO Double Auction: Both buyers and sellers submit prices, matched by auctioneer. E.g: NYSE, NASDAQ, CBOT First-price sealed-bid: Bidders submit closed bids; highest wins. E.g: eBay proxy bidding English: Start low, bid up, highest bid wins. E.g: eBay, Sotheby’s Dutch: Starts high, auctioneer drops price, first to bid wins. (Can go multiple rounds or sealed) E.g: Salon IPO Double Auction: Both buyers and sellers submit prices, matched by auctioneer. E.g: NYSE, NASDAQ, CBOT First-price sealed-bid: Bidders submit closed bids; highest wins. E.g: eBay proxy bidding

Types of Auctions Second-price sealed-bid or Vickrey: All bidders submit sealed bids, second-highest bid wins. Maximizes seller revenue by encouraging upward bidding. Optimal strategy is to bid private valuation. Open to dishonest auctioneers. Generalizations: M-th price Second-price sealed-bid or Vickrey: All bidders submit sealed bids, second-highest bid wins. Maximizes seller revenue by encouraging upward bidding. Optimal strategy is to bid private valuation. Open to dishonest auctioneers. Generalizations: M-th price

Types of Auctions Combinatorial Auction: Given a pool of available goods, buyers bid on all possible allocations of these goods. Maximizes seller revenue and social surplus Winning allocation maximizes total price Each bidder pays difference between the total price that would have been paid without him and the other bidders total payment. FCC uses a modified combinatorial auction to sell rights to EM spectrum. Combinatorial Auction: Given a pool of available goods, buyers bid on all possible allocations of these goods. Maximizes seller revenue and social surplus Winning allocation maximizes total price Each bidder pays difference between the total price that would have been paid without him and the other bidders total payment. FCC uses a modified combinatorial auction to sell rights to EM spectrum.

Vulnerabilities Auction fraud: 46.1% of reported Internet frauds, Median loss $320 Bidders can collude to bid below their valuations (Insider trading) or place unreasonably high bids (Jump bidding) Auctioneers and sellers can insert bids to raise prices (Shill bidding) or tamper with Vickrey prices Many exploits are out-of-bandwidth, esp. on eBay: Non-delivery, fake escrow, etc. Auction fraud: 46.1% of reported Internet frauds, Median loss $320 Bidders can collude to bid below their valuations (Insider trading) or place unreasonably high bids (Jump bidding) Auctioneers and sellers can insert bids to raise prices (Shill bidding) or tamper with Vickrey prices Many exploits are out-of-bandwidth, esp. on eBay: Non-delivery, fake escrow, etc.

Security Goals Prevent buyers, sellers, and auctioneers from tampering with the proper course of the auction. Provide privacy for buyers and sellers Separate bid information from buyer identification. Maintain secrecy of bids in sealed auction. Prevent buyers, sellers, and auctioneers from tampering with the proper course of the auction. Provide privacy for buyers and sellers Separate bid information from buyer identification. Maintain secrecy of bids in sealed auction.

Approaches to Security Legislative: Make laws against breaking the rules of the auction, as for insider trading. Economic/Social: Provide economic incentives for following the rules, as with the eBay recommendation system. Cryptographic: Incorporate a cryptographic protocol to ensure that rules are followed. Legislative: Make laws against breaking the rules of the auction, as for insider trading. Economic/Social: Provide economic incentives for following the rules, as with the eBay recommendation system. Cryptographic: Incorporate a cryptographic protocol to ensure that rules are followed.

Cryptographic Solutions Public auction + Cryptograpic privacy Combinatorial auction + Cryptographic enforcement Elkind & Lipmaa’s novel protocol Many others exist, especially studying Vickrey auctions. Financial Cryptography has several recent examples. Public auction + Cryptograpic privacy Combinatorial auction + Cryptographic enforcement Elkind & Lipmaa’s novel protocol Many others exist, especially studying Vickrey auctions. Financial Cryptography has several recent examples.

Secure Public Auction Provide bidders privacy and anonymity while keeping bid prices public. Introduce two agents: Registration Manager: Tracks identities of bidders by tying their Diffie-Hellman public key to a secret string (unique for each bidder) and generates round keys. Auction Manager: Prepares tickets and decides winner without knowing true identities. Provide bidders privacy and anonymity while keeping bid prices public. Introduce two agents: Registration Manager: Tracks identities of bidders by tying their Diffie-Hellman public key to a secret string (unique for each bidder) and generates round keys. Auction Manager: Prepares tickets and decides winner without knowing true identities. Lee, Kim, & Ma, Indocrypt 2001

I. Bidders register with RM by providing public key, secret string. RM keeps secret string. II. RM creates, shuffles, and publishes a list of round keys, one for each bidder, based on public key and a hash of the secret string. III. AM creates “bidding tickets” consisting of a hash of a round key and an auction key. IV. Bidders find their tickets and place bids by posting their ticket ID and their price. V. The winning ticket is chosen, and the RM reveals a hash of the winner’s secret string. I. Bidders register with RM by providing public key, secret string. RM keeps secret string. II. RM creates, shuffles, and publishes a list of round keys, one for each bidder, based on public key and a hash of the secret string. III. AM creates “bidding tickets” consisting of a hash of a round key and an auction key. IV. Bidders find their tickets and place bids by posting their ticket ID and their price. V. The winning ticket is chosen, and the RM reveals a hash of the winner’s secret string. Secure Public Auction Lee, Kim, & Ma, Indocrypt 2001

At each step, the bidder can recognize information for himself, but AM, RM, and other bidders cannot: Round keys are shuffled, but tied to secret information. Tickets are based on round keys and common information. Bids are tied only to ticket ID numbers. At each step, the bidder can recognize information for himself, but AM, RM, and other bidders cannot: Round keys are shuffled, but tied to secret information. Tickets are based on round keys and common information. Bids are tied only to ticket ID numbers. Secure Public Auction Lee, Kim, & Ma, Indocrypt 2001

Secure Combinatorial Auction Homomorphic crypto: E(ab) = E(a) E(b) Represent prices as “base-1” numbers: Can find max. bid, add a constant without decrypting. Want to bid on allocations, i.e. maps Bid has the form: Homomorphic crypto: E(ab) = E(a) E(b) Represent prices as “base-1” numbers: Can find max. bid, add a constant without decrypting. Want to bid on allocations, i.e. maps Bid has the form: Suzuki & Yokoo, FC2003

Each bidder has valuation function Auctioneer creates “blank bids” Each bidder adds his bid to every blank except the one with his number, so at the end, tells which bid maximizes total price tells what would be paid without bidder Each bidder has valuation function Auctioneer creates “blank bids” Each bidder adds his bid to every blank except the one with his number, so at the end, tells which bid maximizes total price tells what would be paid without bidder Secure Combinatorial Auction Suzuki & Yokoo, FC2003

All calculations are performed on encrypted values. Neither buyers nor the auctioneer know the values of the individual bids. Tampering is obviated by lack of information. Hard part is complexity: All calculations are performed on encrypted values. Neither buyers nor the auctioneer know the values of the individual bids. Tampering is obviated by lack of information. Hard part is complexity: Secure Combinatorial Auction Suzuki & Yokoo, FC2003

Elkind & Lipmaa’s Auction Goals: Protect privacy of bidders Prevent seller/auctioneer tampering Minimize cognitive costs to bidders Perform a series of secure 2nd-price auctions until there is a stable selling price. Goals: Protect privacy of bidders Prevent seller/auctioneer tampering Minimize cognitive costs to bidders Perform a series of secure 2nd-price auctions until there is a stable selling price. Elkind & Lipmaa, FC2004

Before auction, agree on a shared masking function. For each round: Bidders submit masked, encrypted bids to auctioneer, with a zero-knowledge proof that this bid is within a small range below the last bid. All bids are published without names. Auction proceeds until second price stabilizes Identity of winner is determined by a distributed protocol matching the (unknown) max bid to its bidder. Before auction, agree on a shared masking function. For each round: Bidders submit masked, encrypted bids to auctioneer, with a zero-knowledge proof that this bid is within a small range below the last bid. All bids are published without names. Auction proceeds until second price stabilizes Identity of winner is determined by a distributed protocol matching the (unknown) max bid to its bidder. Elkind & Lipmaa’s Auction Elkind & Lipmaa, FC2004

Secure against shill bids, collusive bids, and jump bidding because bids are constrained to be decreasing. Secure against auctioneer tampering because all bids are encrypted. Maintains anonymity of all bidders except winner. Secure against shill bids, collusive bids, and jump bidding because bids are constrained to be decreasing. Secure against auctioneer tampering because all bids are encrypted. Maintains anonymity of all bidders except winner. Elkind & Lipmaa’s Auction Elkind & Lipmaa, FC2004

Summary Auctions play a central role, as a way of organizing price negotiations. Many security vulnerabilities introduced by auction mechanisms can be addressed with cryptographic auction protocols. Cryptographic protocols can also add privacy features lacking in normal mechanisms. However, protocol solutions don’t address other attacks, e.g. bait-and-switch. Auctions play a central role, as a way of organizing price negotiations. Many security vulnerabilities introduced by auction mechanisms can be addressed with cryptographic auction protocols. Cryptographic protocols can also add privacy features lacking in normal mechanisms. However, protocol solutions don’t address other attacks, e.g. bait-and-switch.

References Elkind & Lipmaa (2004) Interleaving Cryptography and Mechanism Design. Financial Cryptography Gottlieb (1999) What is a Dutch auction IPO? Slate Magazine. Internet Fraud Complaint Center (2002) IFCC 2002 Internet Fraud Report. Lee, Kim, & Ma (2001) Efficient Public Auction with One-time Registration and Public Verifiability. Indocrypt Suzuki & Yokoo (2003) Secure Generalized Vickrey Auction using Homomorphic Encryption. Financial Cryptography Elkind & Lipmaa (2004) Interleaving Cryptography and Mechanism Design. Financial Cryptography Gottlieb (1999) What is a Dutch auction IPO? Slate Magazine. Internet Fraud Complaint Center (2002) IFCC 2002 Internet Fraud Report. Lee, Kim, & Ma (2001) Efficient Public Auction with One-time Registration and Public Verifiability. Indocrypt Suzuki & Yokoo (2003) Secure Generalized Vickrey Auction using Homomorphic Encryption. Financial Cryptography 2004.