A blockchain-based privacy-preserving and collusion-resistant scheme (PPCR) for double auctions

Jia Xuedan , Wang Liangmin , Cheng Ke , Jing Pujie , Song Xiangmei

›› 2025, Vol. 11 ›› Issue (1) : 116 -125.

PDF
›› 2025, Vol. 11 ›› Issue (1) :116 -125. DOI: 10.1016/j.dcan.2023.05.002
Original article

A blockchain-based privacy-preserving and collusion-resistant scheme (PPCR) for double auctions

Author information +
History +
PDF

Abstract

Electronic auctions (e-auctions) remove the physical limitations of traditional auctions and bring this mechanism to the general public. However, most e-auction schemes involve a trusted auctioneer, which is not always credible in practice. Some studies have applied cryptography tools to solve this problem by distributing trust, but they ignore the existence of collusion. In this paper, a blockchain-based Privacy-Preserving and Collusion-Resistant scheme (PPCR) for double auctions is proposed by employing both cryptography and blockchain technology, which is the first decentralized and collusion-resistant double auction scheme that guarantees bidder anonymity and bid privacy. A two-server-based auction framework is designed to support off-chain allocation with privacy preservation and on-chain dispute resolution for collusion resistance. A Dispute Resolution agreement (DR) is provided to the auctioneer to prove that they have conducted the auction correctly and the result is fair and correct. In addition, a Concise Dispute Resolution protocol (CDR) is designed to handle situations where the number of accused winners is small, significantly reducing the computation cost of dispute resolution. Extensive experimental results confirm that PPCR can indeed achieve efficient collusion resistance and verifiability of auction results with low on-chain and off-chain computational overhead.

Keywords

Privacy protection / Collusion resistance / Secure protocol / Blockchain-based double auction / Dispute resolution

Cite this article

Download citation ▾
Jia Xuedan, Wang Liangmin, Cheng Ke, Jing Pujie, Song Xiangmei. A blockchain-based privacy-preserving and collusion-resistant scheme (PPCR) for double auctions. , 2025, 11(1): 116-125 DOI:10.1016/j.dcan.2023.05.002

登录浏览全文

4963

注册一个新账户 忘记密码

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgements

This work is supported by the National Key R&D Program of China (No. 2020YFB1005500), the Leading-edge Technology Program of Jiangsu Natural Science Foundation (No. BK20202001), the Fundamental Research Funds for the Central Universities (No. XJSJ23040), and the Postdoctoral Science Foundation of Jiangsu Province (No. 2021K596C).

References

[1]

R. Bapna, P. Goes, A. Gupta, Insights and analyses of online auctions, Commun. ACM 44 (11) (2001) 42-50.

[2]

Q. Wang, J. Huang, Y. Chen, C. Wang, F. Xiao, X. Luo, 𝑝𝑟𝑜𝑠𝑡: privacy-preserving and truthful online double auction for spectrum allocation, IEEE Trans. Inf. Forensics Secur. 14 (2) (2018) 374-386.

[3]

Q. Wang, J. Huang, Y. Chen, X. Tian, Q. Zhang, Privacy-preserving and truthful double auction for heterogeneous spectrum, IEEE/ACM Trans. Netw. 27 (2) (2019) 848-861.

[4]

Y. Chen, X. Tian, Q. Wang, M. Li, M. Du, Q. Li Armor, A secure combinatorial auction for heterogeneous spectrum, IEEE Trans. Mob. Comput. 18 (10) (2018) 2270-2284.

[5]

K. Cheng, L. Wang, Y. Shen, Y. Liu, Y. Wang, L. Zheng, A lightweight auction frame-work for spectrum allocation with strong security guarantees, in: IEEE Conference on Computer Communications, INFOCOM, IEEE, 2020, pp. 1708-1717.

[6]

Z. Chen, W. Ding, Y. Xu, M. Tian, H. Zhong, Fair auctioning and trading frame-work for cloud virtual machines based on blockchain, Comput. Commun. 171 (2021) 89-98, https://doi.org/10.1016/j.comcom.2021.02.010.

[7]

K. Cheng, W. Tong, L. Zheng, J. Fu, X. Mu, Y. Shen, A secure and fair double auction framework for cloud virtual machines, IEEE Access 9 (2021) 87982-87994, https://doi.org/10.1109/ACCESS.2021.3089492.

[8]

M.U. Hassan, M.H. Rehmani, J. Chen Deal, Differentially private auction for blockchain-based microgrids energy trading, IEEE Trans. Serv. Comput. 13 (2) (2019) 263-275.

[9]

J. Wang, B. Yu, Y. Wang, A general secure e-auction model based on bit commit-ment, Chinese J. Comput. 27 (3) (2004) 347-351.

[10]

C.C. Chang, T.F. Cheng, W.Y. Chen, A novel electronic English auction system with a secure on-shelf mechanism, IEEE Trans. Inf. Forensics Secur. 8 (4) (2013) 657-668.

[11]

K. Sako, An auction protocol which hides bids of losers, in: International Workshop on Public Key Cryptography, Springer, 2000, pp. 422-432.

[12]

J. Cartlidge, N.P. Smart, Y. Talibi Alaoui, Mpc joins the dark side, in: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, ACM, 2019, pp. 148-159.

[13]

S. Wu, Y. Chen, Q. Wang, M. Li, C. Wang, X. Luo, Cream: a smart contract en-abled collusion-resistant e-auction, IEEE Trans. Inf. Forensics Secur. 14 (7) (2019) 1687-1701.

[14]

A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou Hawk, The blockchain model of cryptography and privacy-preserving smart contracts, in: 2016 IEEE Symposium on Security and Privacy (S&P), IEEE, 2016, pp. 839-858.

[15]

F. Buccafurri, G. Lax, L. Musarella, A. Russo, An Ethereum-based solution for energy trading in smart grids, Digit. Commun. Netw. 9 (1) (2023) 194-202.

[16]

H.S. Galal, A.M. Youssef, Verifiable sealed-bid auction on the Ethereum blockchain, in: International Conference on Financial Cryptography and Data Security, Springer, 2018, pp. 265-278.

[17]

H.S. Galal, A.M. Youssef, Succinctly verifiable sealed-bid auction smart contract, in: Data Privacy Management, Cryptocurrencies and Blockchain Technology, Springer, 2018, pp. 3-19.

[18]

E.O. Blass, F. Kerschbaum Strain, A secure auction for blockchains, in: European Symposium on Research in Computer Security, Springer, 2018, pp. 87-110.

[19]

H.S. Galal, A.M. Youssef, Trustee: full privacy preserving Vickrey auction on top of Ethereum,in: International Conference on Financial Cryptography and Data Secu-rity, Springer, 2019, pp. 190-207.

[20]

Y. Chen, X. Tian, Q. Wang, J. Jiang, M. Li, Q. Zhang Safe, A general secure and fair auction framework for wireless markets with privacy preservation, IEEE Trans. Dependable Secure Comput. 19 (3) (2022) 2038-2053.

[21]

M.R. Albert, E-buyer beware: why online auction fraud should be regulated, Am. Bus. Law J. 39 (4) (2002) 575-644.

[22]

C. Dong, Y. Wang, A. Aldweesh, P. McCorry, A. van Moorsel, Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing, in: Pro-ceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS, ACM, 2017, pp. 211-227.

[23]

Q. Wang, Q. Sun, K. Ren, X. Jia, Themis: collusion-resistant and fair pricing spectrum auction under dynamic supply, IEEE Trans. Mob. Comput. 16 (7) (2016) 2051-2064.

[24]

A. Hahn, R. Singh, C.C. Liu, S. Chen, Smart contract-based campus demonstration of decentralized transactive energy auctions, in: 2017 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT, IEEE, 2017, pp. 1-5.

[25]

A. Zavodovski, S. Bayhan, N. Mohan, P. Zhou, W. Wong, J. Kangasharju, De-cloud: truthful decentralized double auction for edge clouds, in: 2019 IEEE 39th International Conference on Distributed Computing Systems, ICDCS, IEEE, 2019, pp. 2157-2167.

[26]

Z. Chen, X. Wei, H. Zhong, J. Cui, Y. Xu, S. Zhang, Secure, efficient and practical double spectrum auction, in: 2017 IEEE/ACM 25th International Symposium on Quality of Service, IWQoS, IEEE/ACM, 2017, pp. 1-6.

[27]

K. Cheng, Y. Shen, Y. Zhang, X. Zhu, L. Wang, H. Zhong, Towards efficient privacy-preserving auction mechanism for two-sided cloud markets, in: 2019 IEEE Interna-tional Conference on Communications, ICC, IEEE, 2019, pp. 1-6.

[28]

Y. Peng, Y. Gao, J. Wu, A privacy preserving sealed-bid auction scheme based on block chains, Cyberspace Secur. 9 (8) (2018) 1-7.

[29]

H. Desai, M. Kantarcioglu, L. Kagal, A hybrid blockchain architecture for privacy-enabled and accountable auctions, in: 2019 IEEE International Conference on Blockchain (Blockchain), IEEE, 2019, pp. 34-43.

[30]

F. Benhamouda, S. Halevi, T. Halevi, Supporting private data on hyperledger fab-ric with secure multiparty computation, in: 2018 IEEE International Conference on Cloud Engineering (IC2E), IEEE, 2018, pp. 357-363.

[31]

A.V. Goldberg, J.D. Hartline, Collusion-resistant mechanisms for single-parameter agents, in: Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA, SIAM, 2005, pp. 620-629.

[32]

D. Demmler, T. Schneider, M. Zohner, Aby-a framework for efficient mixed-protocol secure two-party computation, in: 22nd Annual Network and Distributed System Security Symposium (NDSS), ISOC, 2015, pp. 1-15.

[33]

A.V. Goldberg, J.D. Hartline, Competitiveness via consensus, in: Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA, SIAM, 2003, pp. 215-222.

[34]

H. Lin, Z. Cao, X. Liang, J. Shao, Secure threshold multi authority attribute based encryption without a central authority, in: International Conference on Cryptology in India, Springer, 2008, pp. 438-448.

[35]

H. Lin, Z. Cao, X. Liang, J. Shao, Secure threshold multi authority attribute based encryption without a central authority, Inf. Sci. 180 (13) (2010) 2618-2632.

[36]

S. Bag, F. Hao, S.F. Shahandashti, I.G. Ray, Seal: sealed-bid auction without auc-tioneers, IEEE Trans. Inf. Forensics Secur. 15 (2020) 2042-2052, https://doi.org/10.1109/TIFS.2019.2955793.

[37]

H. Lipmaa, N. Asokan, V. Niemi, Secure Vickrey auctions without threshold trust, in: International Conference on Financial Cryptography, Springer, 2002, pp. 87-101.

[38]

C.P. Schnorr, Efficient signature generation by smart cards, J. Cryptol. 4 (3) (1991) 161-174.

[39]

C.P. Schnorr, Efficient identification and signatures for smart cards, in: Conference on the Theory and Application of Cryptology, Springer, 1989, pp. 239-252.

[40]

H.S. Galal, A.M. Youssef, Publicly verifiable and secrecy preserving periodic auc-tions, in: International Conference on Financial Cryptography and Data Security, Springer, 2021, pp. 348-363.

[41]

B. Bünz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, G. Maxwell, Bulletproofs: short proofs for confidential transactions and more, in: 2018 IEEE Symposium on Security and Privacy (S&P), IEEE, 2018, pp. 315-334.

AI Summary AI Mindmap
PDF

509

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/