{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:05:28Z","timestamp":1755907528972,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Science and Engineering Research Board, India","award":["CRG\/2023\/008667"],"award-info":[{"award-number":["CRG\/2023\/008667"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670311","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4062-4076","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure Vickrey Auctions with Rational Parties"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2909-9177","authenticated-orcid":false,"given":"Chaya","family":"Ganesh","sequence":"first","affiliation":[{"name":"Indian Institute of Science, Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2233-6839","authenticated-orcid":false,"given":"Shreyas","family":"Gupta","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7519-4477","authenticated-orcid":false,"given":"Bhavana","family":"Kanukurthi","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2818-7749","authenticated-orcid":false,"given":"Girisha","family":"Shankar","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bengaluru, India"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146381.1146393"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2955793"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474123.3486758"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44799-7_16"},{"key":"e_1_3_2_1_6_1","unstructured":"Jan Camenisch and Markus Stadler. 1997. Proof systems for general statements about discrete logarithms. Technical Report\/ETH Zurich Department of Computer Science Vol. 260 (1997)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--64840--4_10"},{"key":"e_1_3_2_1_8_1","volume-title":"2013 International Conference on Security and Cryptography (SECRYPT). IEEE, 1--12","author":"Catane Boaz","year":"2013","unstructured":"Boaz Catane and Amir Herzberg. 2013. Secure second price auctions with a rational auctioneer. In 2013 International Conference on Security and Cryptography (SECRYPT). IEEE, 1--12."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09234-3_36"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Alan Deckelbaum and Silvio Micali. 2016. Collusion efficiency and dominant strategies. (2016).","DOI":"10.1016\/j.geb.2016.03.008"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Chaya Ganesh Shreyas Gupta Bhavana Kanukurthi and Girisha Shankar. 2024. Secure Vickrey Auctions with Rational Parties. Cryptology ePrint Archive Paper 2024\/1011. https:\/\/doi.org\/10.1145\/3658644.3670311 https:\/\/eprint.iacr.org\/2024\/1011.","DOI":"10.1145\/3658644.3670311"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560706"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.75"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2767386.2767431"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11832072_16"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--84245--1_9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400752"},{"key":"e_1_3_2_1_19_1","volume-title":"Halpern and Rafael Pass","author":"Joseph","year":"2010","unstructured":"Joseph Y. Halpern and Rafael Pass. 2010. Game Theory with Costly Computation: Formulation and Application to Protocol Security. In ICS 2010, Andrew Chi-Chih Yao (Ed.). Tsinghua University Press, 120--142."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007352.1007447"},{"key":"e_1_3_2_1_21_1","volume-title":"International Workshop on Security Protocols. Springer, 202--211","author":"Hao Feng","year":"2006","unstructured":"Feng Hao and Piotr Zieli'nski. 2006. A 2-round anonymous veto protocol. In International Workshop on Security Protocols. Springer, 202--211."},{"key":"e_1_3_2_1_22_1","volume-title":"Bidder Scalable M 1st-Price Auction with Public Verifiability. In 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 34--42","author":"Hsu Po-Chu","year":"2021","unstructured":"Po-Chu Hsu and Atsuko Miyaji. 2021. Bidder Scalable M 1st-Price Auction with Public Verifiability. In 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 34--42."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.64"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--540--78524--8_15"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978357"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--540--78524--8_18"},{"key":"e_1_3_2_1_28_1","unstructured":"Vijay Krishna. 2009. Auction Theory. (2009)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/646649.699493"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09322-2"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765278.1765285"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611462.2611516"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642-03356--8_32"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"volume-title":"Game theory and mechanism design","author":"Narahari Yadati","key":"e_1_3_2_1_35_1","unstructured":"Yadati Narahari. 2014. Game theory and mechanism design. Vol. 4. World Scientific."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06320-1_23"},{"key":"e_1_3_2_1_37_1","volume-title":"FC 2002 (LNCS","volume":"71","author":"Omote Kazumasa","year":"2003","unstructured":"Kazumasa Omote and Atsuko Miyaji. 2003. A Second-price Sealed-bid Auction with the Discriminant of the p0-th Root. In FC 2002 (LNCS, Vol. 2357),, Matt Blaze (Ed.). Springer, Heidelberg, 57--71."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490486.3538342"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670311","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:16:29Z","timestamp":1755843389000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670311"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":38,"alternative-id":["10.1145\/3658644.3670311","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670311","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}