{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:54:18Z","timestamp":1743152058391,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_19","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T10:22:11Z","timestamp":1291630931000},"page":"266-280","source":"Crossref","is-referenced-by-count":10,"title":["Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme"],"prefix":"10.1007","author":[{"given":"Mehrdad","family":"Nojoumian","sequence":"first","affiliation":[]},{"given":"Douglas R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","first-page":"133","volume-title":"Proceedings of the 24th Computer Society International Conference","author":"M. Blum","year":"1982","unstructured":"Blum, M.: Coin flipping by telephone - a protocol for solving impossible problems. In: Proceedings of the 24th Computer Society International Conference, pp. 133\u2013137. IEEE Computer Society, Los Alamitos (1982)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Blundo, C., Masucci, B., Stinson, D.R., Wei, R.: Constructions and bounds for unconditionally secure non-interactive commitment schemes. Designs, Codes and Cryptography 26(1), 97\u2013110 (2002)","DOI":"10.1023\/A:1016501125022"},{"issue":"4","key":"19_CR3","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10207-006-0001-y","volume":"5","author":"F. Brandt","year":"2006","unstructured":"Brandt, F.: How to obtain full privacy in auctions. International Journal of Information Security\u00a05(4), 201\u2013216 (2006)","journal-title":"International Journal of Information Security"},{"key":"19_CR4","first-page":"810","volume-title":"Proceedings of the 3rd International Joint Conference on AAMAS","author":"F. Brandt","year":"2004","unstructured":"Brandt, F., Sandholm, T.: (im)possibility of unconditionally privacy-preserving auctions. In: Proceedings of the 3rd International Joint Conference on AAMAS, pp. 810\u2013817. IEEE Computer Society, Los Alamitos (2004)"},{"issue":"2","key":"19_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1330332.1330338","volume":"11","author":"F. Brandt","year":"2008","unstructured":"Brandt, F., Sandholm, T.: On the existence of unconditionally privacy-preserving auction protocols. ACM Transactions on Information and System Security\u00a011(2), 1\u201321 (2008)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"5","key":"19_CR6","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/32.502223","volume":"22","author":"M.K. Franklin","year":"1996","unstructured":"Franklin, M.K., Reiter, M.K.: The design and implementation of a secure auction service. IEEE Transactions on Software Engineering\u00a022(5), 302\u2013312 (1996)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"19_CR7","volume-title":"Modern Computer Algebra","author":"J.V.Z. Gathen","year":"2003","unstructured":"Gathen, J.V.Z., Gerhard, J.: Modern Computer Algebra. Cambridge University Press, New York (2003)"},{"key":"19_CR8","unstructured":"Harkavy, M., Tygar, J.D., Kikuchi, H.: Electronic auctions with private bids. In: Proceedings of the 3rd Workshop on Electronic Commerce, pp. 61\u201374. USENIX Association (1998)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-44448-3_13","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"M. Jakobsson","year":"2000","unstructured":"Jakobsson, M., Juels, A.: Mix and match: Secure function evaluation via ciphertexts. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 162\u2013177. Springer, Heidelberg (2000)"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-46088-8_27","volume-title":"Proceedings of the 5th International Conference on Financial Cryptography, FC","author":"H. Kikuchi","year":"2002","unstructured":"Kikuchi, H.: (m+1)st-price auction protocol. In: Proceedings of the 5th International Conference on Financial Cryptography, FC, pp. 351\u2013363. Springer, Heidelberg (2002)"},{"key":"19_CR11","first-page":"62","volume-title":"Proceedings of the 1st IEEE Workshop on Dependable and Real-Time E-Commerce Systems","author":"H. Kikuchi","year":"1999","unstructured":"Kikuchi, H., Harkavy, M., Tygar, J.D.: Multi-round anonymous auction protocols. In: Proceedings of the 1st IEEE Workshop on Dependable and Real-Time E-Commerce Systems, pp. 62\u201369. Springer, Heidelberg (1999)"},{"key":"19_CR12","first-page":"307","volume-title":"Proceedings of the 7th Int. Conf. on Parallel and Distributed Systems","author":"H. Kikuchi","year":"2000","unstructured":"Kikuchi, H., Hotta, S., Abe, K., Nakanishi, S.: Distributed auction servers resolving winner and winning bid without revealing privacy of bids. In: Proceedings of the 7th Int. Conf. on Parallel and Distributed Systems, pp. 307\u2013312. IEEE, Los Alamitos (2000)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/11554868_7","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","author":"K. Peng","year":"2005","unstructured":"Peng, K., Boyd, C., Dawson, E.: Optimization of electronic first-bid sealed-bid auction based on homomorphic secret sharing. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.\u00a03715, pp. 84\u201398. Springer, Heidelberg (2005)"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-36159-6_13","volume-title":"Information and Communications Security","author":"K. Peng","year":"2002","unstructured":"Peng, K., Boyd, C., Dawson, E., Viswanathan, K.: Robust, privacy protecting and publicly verifiable sealed-bid auction. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 147\u2013159. Springer, Heidelberg (2002)"},{"key":"19_CR15","unstructured":"Peng, K., Boyd, C., Dawson, E., Viswanathan, K.: Five sealed-bid auction models. In: Proceedings of the Australasian Information Security Workshop Conference, pp. 77\u201386. Australian Computer Society (2003)"},{"key":"19_CR16","unstructured":"Rivest, R.L.: Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initializer. Tech. rep., Massachusetts Institute of Technology (1999)"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-540-46588-1_28","volume-title":"Public Key Cryptography","author":"K. Sako","year":"2000","unstructured":"Sako, K.: An auction protocol which hides bids of losers. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 422\u2013432. Springer, Heidelberg (2000)"},{"key":"19_CR18","unstructured":"Sakurai, K., Miyazaki, S.: A bulletin-board based digital auction scheme with bidding down strategy. In: Proceedings of the CrypTEC, pp. 180\u2013187. HongKong City University (1999)"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/3-540-45247-8_15","volume-title":"Information Security and Cryptology - ICISC 2000","author":"K. Suzuki","year":"2001","unstructured":"Suzuki, K., Kobayashi, K., Morita, H.: Efficient sealed-bid auction using hash chain. In: Won, D. (ed.) ICISC 2000. LNCS, vol.\u00a02015, pp. 183\u2013191. Springer, Heidelberg (2001)"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-36504-4_4","volume-title":"Financial Cryptography","author":"K. Suzuki","year":"2003","unstructured":"Suzuki, K., Yokoo, M.: Secure combinatorial auctions by dynamic programming with polynomial secret sharing. In: Blaze, M. (ed.) FC 2002. LNCS, vol.\u00a02357, pp. 44\u201356. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:17:46Z","timestamp":1566764266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}