{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T09:16:35Z","timestamp":1768986995571,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3600190","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Practical Verifiable &amp; Privacy-Preserving Double Auctions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5196-2894","authenticated-orcid":false,"given":"Armin","family":"Memar Zahedani","sequence":"first","affiliation":[{"name":"Delft University of Technology, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3979-9740","authenticated-orcid":false,"given":"Jelle","family":"Vos","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8932-4703","authenticated-orcid":false,"given":"Zekeriya","family":"Erkin","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_40"},{"key":"e_1_3_2_1_2_1","volume-title":"Security and Cryptography for Networks, Michel Abdalla and Roberto De\u00a0Prisco (Eds.)","author":"Baum Carsten","unstructured":"Carsten Baum, Ivan Damg\u00e5rd, and Claudio Orlandi. 2014. Publicly Auditable Secure Multi-Party Computation. In Security and Cryptography for Networks, Michel Abdalla and Roberto De\u00a0Prisco (Eds.). Springer International Publishing, Cham, 175\u2013196."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_9"},{"key":"e_1_3_2_1_4_1","volume-title":"Secure Multiparty Computation Goes Live","author":"Bogetoft Peter","unstructured":"Peter Bogetoft, Dan\u00a0Lund Christensen, Ivan Damg\u00e5rd, Martin Geisler, Thomas Jakobsen, Mikkel Kr\u00f8igaard, Janus\u00a0Dam Nielsen, Jesper\u00a0Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael Schwartzbach, and Tomas Toft. 2009. Secure Multiparty Computation Goes Live. In Financial Cryptography and Data Security, Roger Dingledine and Philippe Golle (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 325\u2013343."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_1_6_1","volume-title":"Advances in Cryptology, David Chaum, Ronald\u00a0L","author":"Chaum David","unstructured":"David Chaum. 1983. Blind Signatures for Untraceable Payments. In Advances in Cryptology, David Chaum, Ronald\u00a0L. Rivest, and Alan\u00a0T. Sherman (Eds.). Springer US, Boston, MA, 199\u2013203."},{"key":"e_1_3_2_1_7_1","unstructured":"Gilad Edelman. 2021. Google\u2019s Alleged Scheme to Corner the Online Ad Market. https:\/\/www.wired.com\/story\/google-antitrust-ad-market-lawsuit\/"},{"key":"e_1_3_2_1_8_1","volume-title":"Antitrust: Commission opens investigation into possible anticompetitive behaviour by the power exchange EPEX Spot. https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/ip_21_1523","author":"Commision European","year":"2021","unstructured":"European Commision. 2021. Antitrust: Commission opens investigation into possible anticompetitive behaviour by the power exchange EPEX Spot. https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/ip_21_1523"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-63958-0_29"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21062024"},{"key":"e_1_3_2_1_11_1","volume-title":"Extensions to the Paillier Cryptosystem with Applications to Cryptological Protocols. Ph.\u00a0D. Dissertation","author":"Jurik J.","unstructured":"Mads\u00a0J. Jurik. 2003. Extensions to the Paillier Cryptosystem with Applications to Cryptological Protocols. Ph.\u00a0D. Dissertation. University of Aarhus."},{"key":"e_1_3_2_1_12_1","volume-title":"Introduction to Modern Cryptography","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell. 2014. Introduction to Modern Cryptography, Second Edition (2nd ed.). Chapman & Hall\/CRC.","edition":"2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.2977896"},{"key":"e_1_3_2_1_14_1","unstructured":"Isis Lovecruft. 2020. ed25519-dalek. https:\/\/crates.io\/crates\/ed25519-dalek"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0033-4"},{"key":"e_1_3_2_1_16_1","unstructured":"OECD. 2016. Preventing Corruption in Public Procurement. https:\/\/www.oecd.org\/gov\/ethics\/Corruption-Public-Procurement-Brochure.pdf"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_2_1_18_1","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201991","author":"Pedersen Torben\u00a0Pryds","unstructured":"Torben\u00a0Pryds Pedersen. 1992. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In Advances in Cryptology \u2014 CRYPTO \u201991, Joan Feigenbaum (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 129\u2013140."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.12.038"},{"key":"e_1_3_2_1_20_1","unstructured":"Berry Schoenmakers. 2022. Lecture Notes Cryptographic Protocols. https:\/\/www.win.tue.nl\/\u00a0berry\/CryptographicProtocols\/LectureNotes.pdf"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/2050-7038.12360"},{"key":"e_1_3_2_1_22_1","unstructured":"Henry\u00a0de Valence. 2021. Bulletproofs. https:\/\/crates.io\/crates\/bulletproofs"},{"key":"e_1_3_2_1_23_1","unstructured":"Henry\u00a0de Valence. 2021. curve25519-dalek-ng. https:\/\/crates.io\/crates\/curve25519-dalek-ng"},{"key":"e_1_3_2_1_24_1","unstructured":"Jelle Vos. 2022. Scicrypt. https:\/\/crates.io\/crates\/scicrypt"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_26"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265431"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00078"}],"event":{"name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","location":"Benevento Italy","acronym":"ARES 2023"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3600190","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3600190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:13Z","timestamp":1750178173000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3600190"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":27,"alternative-id":["10.1145\/3600160.3600190","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3600190","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}