Second price auctions: a case study of secure distributed computing Ref:
Bart
De Decker, Gregory Neven, Frank Piessens and Erik Van Hoeymissen. In K. Zielinski,
K. Geihs and A. Laurentowski, editors, New Developments in Distributed
Applications and Interoperable Systems, IFIP TC6 / WG6.1 Third International
Working Conference on Distributed Applications and Interoperable Systems,
volume 198 of IFIP Conference Proceedings, pages 217-228. Kluwer Academic
Publishers, 2001. Abstract:
Secure distributed computing addresses the
problem of performing a computation with a number of mutually distrustful
participants, in such a way that each of the participants, in such a way that
each of the participants has only limited access to the information needed
for doing the computation. Over the past two decades, a number of solutions
requiring no trusted third party have been developed using cryptographic techniques.
The disadvantage of these cryptographic solutions is the excessive communication
overhead they incur. |