Second price auctions: a case study of secure distributed computing
De Decker, Gregory Neven, Frank Piessens and Erik Van Hoeymissen. In K. Zielinski,
K. Geihs and A. Laurentowski, editors, New Developments in Distributed
Applications and Interoperable Systems, IFIP TC6 / WG6.1 Third International
Working Conference on Distributed Applications and Interoperable Systems,
volume 198 of IFIP Conference Proceedings, pages 217-228. Kluwer Academic
Secure distributed computing addresses the
problem of performing a computation with a number of mutually distrustful
participants, in such a way that each of the participants, in such a way that
each of the participants has only limited access to the information needed
for doing the computation. Over the past two decades, a number of solutions
requiring no trusted third party have been developed using cryptographic techniques.
The disadvantage of these cryptographic solutions is the excessive communication
overhead they incur.