{"id":"https://openalex.org/W1590338784","doi":"https://doi.org/10.1109/infocom.2015.7218591","title":"ITSEC: An information-theoretically secure framework for truthful spectrum auctions","display_name":"ITSEC: An information-theoretically secure framework for truthful spectrum auctions","publication_year":2015,"publication_date":"2015-04-01","ids":{"openalex":"https://openalex.org/W1590338784","doi":"https://doi.org/10.1109/infocom.2015.7218591","mag":"1590338784"},"language":"en","primary_location":{"id":"doi:10.1109/infocom.2015.7218591","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2015.7218591","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Conference on Computer Communications (INFOCOM)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018009756","display_name":"Zhili Chen","orcid":"https://orcid.org/0000-0002-2231-3652"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhili Chen","raw_affiliation_strings":["Suzhou Institute for Advanced Study, University of Science and Technology of China, Suzhou, China","School of Computer Science and Technology University of Science and Technology of China,Hefei,China"],"affiliations":[{"raw_affiliation_string":"Suzhou Institute for Advanced Study, University of Science and Technology of China, Suzhou, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Technology University of Science and Technology of China,Hefei,China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019604942","display_name":"Liusheng Huang","orcid":"https://orcid.org/0000-0001-8417-3256"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liusheng Huang","raw_affiliation_strings":["Suzhou Institute for Advanced Study, University of Science and Technology of China, Suzhou, China","School of Computer Science and Technology University of Science and Technology of China,Hefei,China"],"affiliations":[{"raw_affiliation_string":"Suzhou Institute for Advanced Study, University of Science and Technology of China, Suzhou, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Technology University of Science and Technology of China,Hefei,China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069716714","display_name":"Lin Chen","orcid":"https://orcid.org/0000-0001-7943-3172"},"institutions":[{"id":"https://openalex.org/I4210144804","display_name":"Laboratoire de Recherche en Informatique","ror":"https://ror.org/04e3ktk27","country_code":"FR","type":"facility","lineage":["https://openalex.org/I102197404","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210144804","https://openalex.org/I4210159245"]},{"id":"https://openalex.org/I102197404","display_name":"Universit\u00e9 Paris-Sud","ror":"https://ror.org/028rypz17","country_code":"FR","type":"education","lineage":["https://openalex.org/I102197404"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Lin Chen","raw_affiliation_strings":["Lab. Recherche Informatique (LRI-CNRS UMR 8623), Univ. Paris-Sud, Orsay, France","Lab. Recherche Informatique (LRI-CNRS UMR 8623), Univ. Paris-Sud, 91405 Orsay, France#TAB#"],"affiliations":[{"raw_affiliation_string":"Lab. Recherche Informatique (LRI-CNRS UMR 8623), Univ. Paris-Sud, Orsay, France","institution_ids":["https://openalex.org/I102197404","https://openalex.org/I1294671590","https://openalex.org/I4210144804"]},{"raw_affiliation_string":"Lab. Recherche Informatique (LRI-CNRS UMR 8623), Univ. Paris-Sud, 91405 Orsay, France#TAB#","institution_ids":["https://openalex.org/I102197404","https://openalex.org/I1294671590","https://openalex.org/I4210144804"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018009756"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":2.82870822,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.94723112,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"29","issue":null,"first_page":"2065","last_page":"2073"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/common-value-auction","display_name":"Common value auction","score":0.8275941014289856},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7368030548095703},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6076993346214294},{"id":"https://openalex.org/keywords/spectrum-auction","display_name":"Spectrum auction","score":0.59574294090271},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5559678077697754},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5298587679862976},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.510592520236969},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.47436437010765076},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.46206483244895935},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.42429715394973755},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4176601767539978},{"id":"https://openalex.org/keywords/combinatorial-auction","display_name":"Combinatorial auction","score":0.41124340891838074},{"id":"https://openalex.org/keywords/auction-theory","display_name":"Auction theory","score":0.35227468609809875},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1828775703907013},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13782250881195068},{"id":"https://openalex.org/keywords/revenue-equivalence","display_name":"Revenue equivalence","score":0.07751080393791199}],"concepts":[{"id":"https://openalex.org/C163239763","wikidata":"https://www.wikidata.org/wiki/Q5153637","display_name":"Common value auction","level":2,"score":0.8275941014289856},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7368030548095703},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6076993346214294},{"id":"https://openalex.org/C94253299","wikidata":"https://www.wikidata.org/wiki/Q4346752","display_name":"Spectrum auction","level":5,"score":0.59574294090271},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5559678077697754},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5298587679862976},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.510592520236969},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.47436437010765076},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.46206483244895935},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.42429715394973755},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4176601767539978},{"id":"https://openalex.org/C59919655","wikidata":"https://www.wikidata.org/wiki/Q5150821","display_name":"Combinatorial auction","level":3,"score":0.41124340891838074},{"id":"https://openalex.org/C11276805","wikidata":"https://www.wikidata.org/wiki/Q771334","display_name":"Auction theory","level":3,"score":0.35227468609809875},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1828775703907013},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13782250881195068},{"id":"https://openalex.org/C143684077","wikidata":"https://www.wikidata.org/wiki/Q431186","display_name":"Revenue equivalence","level":4,"score":0.07751080393791199},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom.2015.7218591","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2015.7218591","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Conference on Computer Communications (INFOCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W58354739","https://openalex.org/W1534636449","https://openalex.org/W1537409952","https://openalex.org/W1666126665","https://openalex.org/W1906253906","https://openalex.org/W1914453949","https://openalex.org/W1972489353","https://openalex.org/W1998906903","https://openalex.org/W2013623332","https://openalex.org/W2040168265","https://openalex.org/W2047388817","https://openalex.org/W2054995322","https://openalex.org/W2056788611","https://openalex.org/W2092422002","https://openalex.org/W2093954960","https://openalex.org/W2100455208","https://openalex.org/W2106237316","https://openalex.org/W2129791350","https://openalex.org/W2137051141","https://openalex.org/W2139536507","https://openalex.org/W2141389982","https://openalex.org/W2141420453","https://openalex.org/W2165716457","https://openalex.org/W2167094273","https://openalex.org/W2168208361","https://openalex.org/W2170696315","https://openalex.org/W2171090088","https://openalex.org/W2233233025","https://openalex.org/W2397857137","https://openalex.org/W2970097841","https://openalex.org/W3141585064","https://openalex.org/W6632108307","https://openalex.org/W6632122397","https://openalex.org/W6636942690","https://openalex.org/W6640015447","https://openalex.org/W6640157010","https://openalex.org/W6664056887","https://openalex.org/W6675888864","https://openalex.org/W6680823525","https://openalex.org/W6680874277","https://openalex.org/W6698135423"],"related_works":["https://openalex.org/W4387242778","https://openalex.org/W2433975032","https://openalex.org/W2039687944","https://openalex.org/W3122604553","https://openalex.org/W1616763919","https://openalex.org/W2479784301","https://openalex.org/W1996703324","https://openalex.org/W218353229","https://openalex.org/W3123645920","https://openalex.org/W1506943689"],"abstract_inverted_index":{"Truthful":[0],"auctions":[1,37,49,137,156],"make":[2],"bidders":[3],"reveal":[4],"their":[5,12],"true":[6,29],"valuations":[7],"for":[8,41,84,98,134,150],"goods":[9],"to":[10,22,42,61,176],"maximize":[11],"utilities.":[13],"Currently,":[14],"almost":[15],"all":[16],"spectrum":[17,36,86,99,136,155,177],"auction":[18,100,178],"designs":[19],"are":[20,38],"required":[21],"be":[23],"truthful.":[24],"However,":[25],"disclosure":[26],"of":[27,74,105,141,172],"one's":[28],"value":[30],"causes":[31],"numerous":[32],"security":[33,97,118,182],"vulnerabilities.":[34],"Secure":[35],"thus":[39],"called":[40],"address":[43],"such":[44],"information":[45],"leakage.":[46],"Previous":[47],"secure":[48,81,132],"either":[50],"did":[51],"not":[52,93],"achieve":[53],"enough":[54],"security,":[55],"or":[56],"were":[57],"very":[58],"slow":[59],"due":[60],"heavy":[62],"computation":[63,112,173],"and":[64,113,147,153,184],"communication":[65,114,188],"overhead.":[66,189],"In":[67],"this":[68],"paper,":[69],"inspired":[70],"by":[71,116],"the":[72,103,129,139,158],"idea":[73],"secret":[75],"sharing,":[76],"we":[77],"design":[78,146],"an":[79],"information-theoretically":[80,131],"framework":[82,133],"(ITSEC)":[83],"truthful":[85,135],"auctions.":[87],"As":[88],"a":[89],"distinguished":[90],"feature,":[91],"ITSEC":[92,127,159,166],"only":[94,186],"achieves":[95,167],"information-theoretic":[96],"protocols":[101],"in":[102,138,170],"sense":[104],"cryptography,":[106],"but":[107],"also":[108,145],"greatly":[109],"reduces":[110],"both":[111,151],"overhead":[115],"ensuring":[117],"without":[119,180],"using":[120],"any":[121,181],"encryption/description":[122],"algorithm.":[123],"To":[124],"our":[125],"knowledge,":[126],"is":[128],"first":[130],"presence":[140],"semi-honest":[142],"adversaries.":[143],"We":[144],"implement":[148],"circuits":[149],"single-sided":[152],"double":[154],"under":[157],"framework.":[160],"Extensive":[161],"experimental":[162],"results":[163],"demonstrate":[164],"that":[165],"comparable":[168],"performance":[169],"terms":[171],"with":[174],"respect":[175],"mechanisms":[179],"measure,":[183],"incurs":[185],"limited":[187]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
