4.5 Article

SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability

Journal

Publisher

ELSEVIER
DOI: 10.1016/j.jisa.2021.103082

Keywords

Sealed-bid auction; Smart contract; Privacy preserving; Zero knowledge; Public verifiability

Funding

  1. National Natural Science Founda-tion of China [U20A20176, 62072062, 62102050]
  2. Natural Sci-ence Foundation of Chongqing [cstc2019jcyjjqX0026]
  3. Funda-mental Research Funds for the Central Universities [2021CDJKYJH025]
  4. Guangxi Key Laboratory of Trusted Software [KX202043]

Ask authors/readers for more resources

Electronic auction has become a popular method for resource allocation in contemporary society but also brings new challenges such as low robustness, data privacy, and trust issues. An effective smart contract-based privacy-preserving sealed-bid reverse auction scheme can address these concerns.
Electronic auction (e-auction) has become one of the most popular approaches to allocate resources or services in contemporary society because of removing physical limitations of traditional auctions. The rapid expansion of e-auction enhances work efficiency but incurs some new and distinctive challenges such as low-robustness, data privacy, and lack of trust. To address the above concerns, various auction designs have been proposed by researchers from the academic and industrial circles. However, most of them fail in simultaneously achieving decentralization (i.e. auctioneer-free), privacy-preserving (i.e. bids privacy), collusion-resistance, and secure channel free. In this paper, we present an effective smart contract-based verifiable privacy-preserving sealed-bid reverse auction scheme, which not only has no need for trusted third parties, but also achieves robustness and privacy protection of losing bids even in the face of overwhelming collusion. In this scheme, the central auctioneer is replaced with some carefully designed smart contracts for decentralization, while zero-knowledge proof and anonymous veto networks are used to avoid the secret communication channel, support the public verifiability and detect the malicious behaviors of bidders. More practically, the complexity of the designed scheme is independent of the number of bidders. Finally, we implement a prototype of our design based on a locally simulated Ethereum test network. The extensive experimental results demonstrate the scheme is the high efficiency and practicality.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available