{"id":"https://openalex.org/W4385713427","doi":"https://doi.org/10.1145/3600160.3600190","title":"Practical Verifiable &amp; Privacy-Preserving Double Auctions","display_name":"Practical Verifiable &amp; Privacy-Preserving Double Auctions","publication_year":2023,"publication_date":"2023-08-09","ids":{"openalex":"https://openalex.org/W4385713427","doi":"https://doi.org/10.1145/3600160.3600190"},"language":"en","primary_location":{"id":"doi:10.1145/3600160.3600190","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3600160.3600190","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3600160.3600190","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3600160.3600190","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053282946","display_name":"Armin Memar Zahedani","orcid":"https://orcid.org/0009-0002-5196-2894"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Armin Memar Zahedani","raw_affiliation_strings":["Delft University of Technology, Netherlands"],"affiliations":[{"raw_affiliation_string":"Delft University of Technology, Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045164258","display_name":"Jelle Vos","orcid":"https://orcid.org/0000-0002-3979-9740"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jelle Vos","raw_affiliation_strings":["Delft University of Technology, Netherlands"],"affiliations":[{"raw_affiliation_string":"Delft University of Technology, Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088322463","display_name":"Zekeriya Erkin","orcid":"https://orcid.org/0000-0001-8932-4703"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Zekeriya Erkin","raw_affiliation_strings":["Delft University of Technology, Netherlands"],"affiliations":[{"raw_affiliation_string":"Delft University of Technology, Netherlands","institution_ids":["https://openalex.org/I98358874"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053282946"],"corresponding_institution_ids":["https://openalex.org/I98358874"],"apc_list":null,"apc_paid":null,"fwci":0.9163,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.79531944,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11182","display_name":"Auction Theory and Applications","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/common-value-auction","display_name":"Common value auction","score":0.8017730712890625},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.72137451171875},{"id":"https://openalex.org/keywords/forward-auction","display_name":"Forward auction","score":0.703956663608551},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5857813954353333},{"id":"https://openalex.org/keywords/double-auction","display_name":"Double auction","score":0.5650226473808289},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5370188355445862},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.4993422031402588},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.49671345949172974},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4782256484031677},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4269155263900757},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3648379147052765},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.28940466046333313},{"id":"https://openalex.org/keywords/auction-theory","display_name":"Auction theory","score":0.2823370397090912},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.21113553643226624},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.175247460603714}],"concepts":[{"id":"https://openalex.org/C163239763","wikidata":"https://www.wikidata.org/wiki/Q5153637","display_name":"Common value auction","level":2,"score":0.8017730712890625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.72137451171875},{"id":"https://openalex.org/C160903226","wikidata":"https://www.wikidata.org/wiki/Q5473265","display_name":"Forward auction","level":4,"score":0.703956663608551},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5857813954353333},{"id":"https://openalex.org/C2539976","wikidata":"https://www.wikidata.org/wiki/Q12163285","display_name":"Double auction","level":3,"score":0.5650226473808289},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5370188355445862},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.4993422031402588},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.49671345949172974},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4782256484031677},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4269155263900757},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3648379147052765},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.28940466046333313},{"id":"https://openalex.org/C11276805","wikidata":"https://www.wikidata.org/wiki/Q771334","display_name":"Auction theory","level":3,"score":0.2823370397090912},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.21113553643226624},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.175247460603714},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3600160.3600190","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3600160.3600190","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3600160.3600190","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:tudelft.nl:uuid:38aa5658-5ac0-4af1-9148-6059e7da86b0","is_oa":false,"landing_page_url":"http://resolver.tudelft.nl/uuid:38aa5658-5ac0-4af1-9148-6059e7da86b0","pdf_url":null,"source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"}],"best_oa_location":{"id":"doi:10.1145/3600160.3600190","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3600160.3600190","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3600160.3600190","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4385713427.pdf"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W208925364","https://openalex.org/W1595357546","https://openalex.org/W2110019712","https://openalex.org/W2115148615","https://openalex.org/W2132172731","https://openalex.org/W2400931589","https://openalex.org/W2546194403","https://openalex.org/W2883748642","https://openalex.org/W3009622382","https://openalex.org/W3010417348","https://openalex.org/W3123939637","https://openalex.org/W3131030068","https://openalex.org/W3138441034","https://openalex.org/W3199128408","https://openalex.org/W4300349690","https://openalex.org/W4385654194"],"related_works":["https://openalex.org/W2097878914","https://openalex.org/W2163938064","https://openalex.org/W2402103399","https://openalex.org/W1668930494","https://openalex.org/W3123898011","https://openalex.org/W2025760266","https://openalex.org/W1503914521","https://openalex.org/W3121964031","https://openalex.org/W3043333677","https://openalex.org/W341888933"],"abstract_inverted_index":{"Double":[0],"auctions":[1,112,115,126,246],"are":[2,102,116,136],"procedures":[3],"to":[4,29,180,184,213,216,225,244,247],"trade":[5],"commodities":[6,57],"such":[7],"as":[8,97],"electricity":[9,109,185],"or":[10,31],"parts":[11],"of":[12,141,153],"the":[13,23,48,51,65,76,81,87,90,139,144,167,220,230,249],"wireless":[14],"spectrum":[15],"at":[16,33],"optimal":[17,52],"prices.":[18,35],"Buyers":[19],"and":[20,43,46,110,130,170,197,229,235],"sellers":[21],"inform":[22],"auctioneer":[24,37,66,91,221],"what":[25],"quantity":[26],"they":[27,78],"want":[28],"buy":[30],"sell":[32],"specific":[34],"The":[36],"aggregates":[38],"these":[39,148,242],"offers":[40,82],"into":[41],"demand":[42],"supply":[44],"curves":[45],"finds":[47],"intersection":[49],"representing":[50],"price.":[53],"In":[54,156,200],"this":[55,157],"way,":[56],"exchange":[58],"owners":[59],"in":[60,108,127,237],"an":[61,227],"economically-efficient":[62],"manner.":[63],"Ideally,":[64],"is":[67,233],"a":[68,128,161,201],"trusted":[69],"third":[70],"party":[71],"that":[72,123,175,209],"does":[73,176],"not":[74,103,177],"abuse":[75],"information":[77,85],"gain.":[79],"However,":[80,133],"reveal":[83],"sensitive":[84],"about":[86],"traders,":[88,206],"which":[89],"may":[92],"use":[93],"for":[94,113,121],"economic":[95],"gain":[96],"insider":[98],"information.":[99],"These":[100,118],"concerns":[101,119],"theoretical;":[104],"investigations":[105],"against":[106],"auctioneers":[107],"advertisement":[111],"manipulating":[114],"ongoing.":[117],"call":[120],"solutions":[122,135,146],"conduct":[124],"double":[125,172],"privacy-preserving":[129,169],"verifiable":[131,171],"way.":[132],"current":[134],"impractical:":[137],"To":[138],"best":[140],"our":[142],"knowledge,":[143],"only":[145],"satisfying":[147],"properties":[149],"require":[150,178],"full":[151],"interaction":[152],"all":[154],"participants.":[155],"work,":[158],"we":[159,207],"design":[160],"more":[162],"practical":[163,250],"solution.":[164],"We":[165,240],"propose":[166],"first":[168],"auction":[173,203,231],"scheme":[174],"traders":[179,210],"interact":[181],"actively,":[182],"tailored":[183],"trading":[186],"on":[187,193],"(inter)national":[188],"exchanges.":[189],"Our":[190],"solution":[191],"relies":[192],"homomorphic":[194],"encryption,":[195],"commitments,":[196],"zero-knowledge":[198],"proofs.":[199],"simulated":[202],"with":[204],"256":[205],"observe":[208],"take":[211],"up":[212],"10":[214,223],"seconds":[215,224],"generate":[217],"their":[218],"order,":[219,228],"takes":[222],"verify":[226],"result":[232],"computed":[234],"verified":[236],"30":[238],"seconds.":[239],"extrapolate":[241],"results":[243],"larger":[245],"show":[248],"potential.":[251]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-01-26T23:06:41.788003","created_date":"2025-10-10T00:00:00"}
