{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:40:03Z","timestamp":1742935203229,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819609567"},{"type":"electronic","value":"9789819609574"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0957-4_11","type":"book-chapter","created":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:34:11Z","timestamp":1738272851000},"page":"201-220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On Sealed-Bid Combinatorial Auction with\u00a0Privacy-Preserving Dynamic Programming"],"prefix":"10.1007","author":[{"given":"Hong Yen","family":"Tran","sequence":"first","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Shabnam Kasra","family":"Kermanshahi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,31]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.023","volume":"88","author":"R Alvarez","year":"2020","unstructured":"Alvarez, R., Nojoumian, M.: Comprehensive survey on privacy-preserving protocols for sealed-bid auctions. Comput. Secur. 88, 101502 (2020)","journal-title":"Comput. Secur."},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"2042","DOI":"10.1109\/TIFS.2019.2955793","volume":"15","author":"S Bag","year":"2019","unstructured":"Bag, S., Hao, F., Shahandashti, S.F., Ray, I.G.: Seal: sealed-bid auction without auctioneers. IEEE Trans. Inf. Forensics Secur. 15, 2042\u20132052 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3731","key":"11_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1126\/science.153.3731.34","volume":"153","author":"R Bellman","year":"1966","unstructured":"Bellman, R.: Dynamic programming. Science 153(3731), 34\u201337 (1966)","journal-title":"Science"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-99073-6_5","volume-title":"Computer Security","author":"E-O Blass","year":"2018","unstructured":"Blass, E.-O., Kerschbaum, F.: Strain: a secure auction for blockchains. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11098, pp. 87\u2013110. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99073-6_5"},{"key":"11_CR5","first-page":"15676","volume":"33","author":"CL Canonne","year":"2020","unstructured":"Canonne, C.L., Kamath, G., Steinke, T.: The discrete gaussian for differential privacy. Adv. Neural. Inf. Process. Syst. 33, 15676\u201315688 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"11_CR6","volume":"65","author":"B Chen","year":"2022","unstructured":"Chen, B., Li, X., Xiang, T., Wang, P.: Sbrac: blockchain-based sealed-bid auction with bidding price privacy and public verifiability. J. Inf. Secur. Appl. 65, 103082 (2022)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"11_CR7","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1504\/IJACT.2008.017048","volume":"1","author":"I Damgard","year":"2008","unstructured":"Damgard, I., Geisler, M., Kroigard, M.: Homomorphic encryption and secure comparison. Int. J. Appl. Cryptogr. 1(1), 22\u201331 (2008)","journal-title":"Int. J. Appl. Cryptogr."},{"key":"11_CR8","unstructured":"Damle, S., Faltings, B., Gujar, S.: A practical solution to yao\u2019s millionaires\u2019 problem and its application in designing secure combinatorial auction. arXiv preprint arXiv:1906.06567 (2019)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Damle, S., Faltings, B., Gujar, S.: Blockchain-based practical multi-agent secure comparison and its application in auctions. In: IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp. 430\u2013437 (2021)","DOI":"10.1145\/3486622.3493937"},{"issue":"3","key":"11_CR10","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1287\/ijoc.15.3.284.16077","volume":"15","author":"S De Vries","year":"2003","unstructured":"De Vries, S., Vohra, R.V.: Combinatorial auctions: a survey. INFORMS J. Comput. 15(3), 284\u2013309 (2003)","journal-title":"INFORMS J. Comput."},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Galal, H.S., Youssef, A.M.: Verifiable sealed-bid auction on the ethereum blockchain. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 265\u2013278. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_18","DOI":"10.1007\/978-3-662-58820-8_18"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Ghasaei, E., Baniasadi, A.: Blockchain-based, privacy-preserving, first price sealed bid auction (fpsba) verifiable by participants. In: 2023 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), pp.\u00a01\u20138. IEEE (2023)","DOI":"10.1109\/BRAINS59668.2023.10316768"},{"issue":"1","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-017-0068-1","volume":"2017","author":"Z Guo","year":"2017","unstructured":"Guo, Z., Fu, Yu., Cao, C.: Secure first-price sealed-bid auction scheme. EURASIP J. Inf. Secur. 2017(1), 1\u20136 (2017). https:\/\/doi.org\/10.1186\/s13635-017-0068-1","journal-title":"EURASIP J. Inf. Secur."},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: Proceedings of the 1st ACM Conference on Electronic Commerce, pp. 129\u2013139 (1999)","DOI":"10.1145\/336992.337028"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-319-06320-1_23","volume-title":"Information Security Practice and Experience","author":"M Nojoumian","year":"2014","unstructured":"Nojoumian, M., Stinson, D.R.: Efficient sealed-bid auction protocols using verifiable secret sharing. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 302\u2013317. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06320-1_23"},{"key":"11_CR16","doi-asserted-by":"publisher","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-x_16","DOI":"10.1007\/3-540-48910-x_16"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-642-03549-4_19","volume-title":"Financial Cryptography and Data Security","author":"DC Parkes","year":"2009","unstructured":"Parkes, D.C., Rabin, M.O., Thorpe, C.: Cryptographic combinatorial clock-proxy auctions. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 305\u2013324. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03549-4_19"},{"issue":"8","key":"11_CR18","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1287\/mnsc.44.8.1131","volume":"44","author":"MH Rothkopf","year":"1998","unstructured":"Rothkopf, M.H., Peke\u010d, A., Harstad, R.M.: Computationally manageable combinational auctions. Manag. Sci. 44(8), 1131\u20131147 (1998)","journal-title":"Manag. Sci."},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Shi, Z., de\u00a0Laat, C., Grosso, P., Zhao, Z.: Integration of blockchain and auction models: a survey, some applications, and challenges. IEEE Commun. Surv. Tutor. (2022)","DOI":"10.1109\/COMST.2022.3222403"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-36504-4_4","volume-title":"Financial Cryptography","author":"K Suzuki","year":"2003","unstructured":"Suzuki, K., Yokoo, M.: Secure combinatorial auctions by dynamic programming with polynomial secret sharing. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 44\u201356. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36504-4_4"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Veugen, T.: Improving the dgk comparison protocol. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 49\u201354. IEEE (2012)","DOI":"10.1109\/WIFS.2012.6412624"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Yokoo, M., Suzuki, K.: Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 1, pp. 112\u2013119 (2002)","DOI":"10.1145\/544741.544770"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, Z., et al.: A blockchain-based privacy-preserving scheme for sealed-bid auction. IEEE Trans. Dependable Secure Comput. (2024)","DOI":"10.1109\/TDSC.2024.3353540"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0957-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:34:18Z","timestamp":1738272858000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0957-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819609567","9789819609574"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0957-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"31 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/provsec2024.github.io\/ProvSec2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}