Skip to main content

Cryptographic protocols for auctions and bargaining

  • Chapter
  • First Online:
Results and Trends in Theoretical Computer Science

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 812))

Abstract

Modern mathematical cryptography provides many protocols for designing social and economic institutions. This article deals with cryptographic protocols for auctions, bargaining and arbitration. The main contribution of the protocols is in the elimination of specific types of behaviour which otherwise might undermine the desirable properties of the institutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Brams, S.J., D.M. Kilgour, and S. Merrill III. 1991. “Arbitration Procedures.” In Negotiation Analysis, ed. H.P. Young. Ann Arbor: The University of Michigan Press.

    Google Scholar 

  • Brams, S.J., D.M. Kilgour, and S. Weber. 1991. “Sequential Arbitration Procedures.” In Systematic Analysis in Disputs Resolution, ed. S.S. Nagel and M.K. Mills. Westport: Quorum.

    Google Scholar 

  • Brams, S.J., and S. Merrill III. 1986. “Binding versus Final-Offer Arbitration: A Combination Is Best.” Management Science 32: 1346–1355.

    Google Scholar 

  • Brams, S.J., and S. Merrill III. 1991. “Final-Offer Arbitration with a Bonus.” European Journal of Political Economy 7: 79–92.

    Google Scholar 

  • Diffie, W., and M. Hellman. 1976. “New Directions in Cryptography.” IEEE Transactions on Information Theory IT-22: 644–654.

    Google Scholar 

  • Fisher, R., and W. Ury. 1981. Getting to Yes: Negotiating Agreement Without Giving. In. Boston: Houghton Mifflin.

    Google Scholar 

  • Hansen, R. G.. 1988. “Auctions with Endogenous Quantity.” Rand Journal of Economics 19: 44–58.

    Google Scholar 

  • Johnson, M.R. 1990. “A Multidimensional Incentive-Compatible Mechanism for Contract Specification and Award.” Department of Economics, Finance and Legal Studies, University of Alabama, April 26.

    Google Scholar 

  • McAfee, R.P., and J. McMillan. 1987. “Auctions and Bidding.” Journal of Economic Literature 25: 699–738.

    Google Scholar 

  • Milgrom, P. 1989. “Auctions and Bidding: A Primer.” Journal of Economic Perspectives 3: 3–22.

    Google Scholar 

  • Nurmi, H. 1989. “Computational Approaches to Bargaining and Choice.” Journal of Theoretical Politics 1: 407–426.

    Google Scholar 

  • Nurmi, H., and A. Salomaa. 1993a. “Cancellation and Reassignment of Votes in Secret Ballot Elections.” European Journal of Political Economy 9: 427–435.

    Google Scholar 

  • Nurmi, H., and A. Salomaa. 1993b. “Cryptographic Protocols for Vickrey Auctions.” Group Decision and Negotiation 2: 363–373.

    Google Scholar 

  • Nurmi, H., and A. Salomaa. 1993c. “The Nearly Perfect Auctioneer: Cryptographic Protocols for Auctions and Bidding.” Prepared for delivery at Conference on Decision Making: Towards 21st Century, Madrid, Spain, June 2–5.

    Google Scholar 

  • Raiffa, H. 1982. The Art and Science of Negotiation. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Riley, J.G. 1989. “Expected Revenue from Open and Sealed Bid Auctions.” Journal of Economic Perspectives 3: 41–50.

    Google Scholar 

  • Rivest, R., A. Shamir, and L. Adleman. 1978. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” ACM Communications 21: 120–126.

    Google Scholar 

  • Rothkopf, M.H., Th.J. Teisberg, and E.P. Kahn. 1990. “Why Are Vickrey Auctions Rare?” Journal of Political Economy 98: 94–109.

    Google Scholar 

  • Salomaa, A. 1985. Computation and Automata. Cambridge: Cambridge University Press.

    Google Scholar 

  • Salomaa, A. 1990. Public-Key Cryptography. Berlin-Heidelberg-New York: Springer-Verlag.

    Google Scholar 

  • Vickrey, W. 1961. “Counter Speculation, Auctions and Competitive Sealed Tenders.” Journal of Finance 16: 8–37.

    Google Scholar 

  • Yao, A. C. 1982. “Protocols for Secure Computation.” 23rd Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Juliani Karhumäki Hermann Maurer Grzegorz Rozenberg

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Nurmi, H. (1994). Cryptographic protocols for auctions and bargaining. In: Karhumäki, J., Maurer, H., Rozenberg, G. (eds) Results and Trends in Theoretical Computer Science. Lecture Notes in Computer Science, vol 812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58131-6_56

Download citation

  • DOI: https://doi.org/10.1007/3-540-58131-6_56

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-58131-4

  • Online ISBN: 978-3-540-48445-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics