Abstract
Modern mathematical cryptography provides many protocols for designing social and economic institutions. This article deals with cryptographic protocols for auctions, bargaining and arbitration. The main contribution of the protocols is in the elimination of specific types of behaviour which otherwise might undermine the desirable properties of the institutions.
Preview
Unable to display preview. Download preview PDF.
References
Brams, S.J., D.M. Kilgour, and S. Merrill III. 1991. “Arbitration Procedures.” In Negotiation Analysis, ed. H.P. Young. Ann Arbor: The University of Michigan Press.
Brams, S.J., D.M. Kilgour, and S. Weber. 1991. “Sequential Arbitration Procedures.” In Systematic Analysis in Disputs Resolution, ed. S.S. Nagel and M.K. Mills. Westport: Quorum.
Brams, S.J., and S. Merrill III. 1986. “Binding versus Final-Offer Arbitration: A Combination Is Best.” Management Science 32: 1346–1355.
Brams, S.J., and S. Merrill III. 1991. “Final-Offer Arbitration with a Bonus.” European Journal of Political Economy 7: 79–92.
Diffie, W., and M. Hellman. 1976. “New Directions in Cryptography.” IEEE Transactions on Information Theory IT-22: 644–654.
Fisher, R., and W. Ury. 1981. Getting to Yes: Negotiating Agreement Without Giving. In. Boston: Houghton Mifflin.
Hansen, R. G.. 1988. “Auctions with Endogenous Quantity.” Rand Journal of Economics 19: 44–58.
Johnson, M.R. 1990. “A Multidimensional Incentive-Compatible Mechanism for Contract Specification and Award.” Department of Economics, Finance and Legal Studies, University of Alabama, April 26.
McAfee, R.P., and J. McMillan. 1987. “Auctions and Bidding.” Journal of Economic Literature 25: 699–738.
Milgrom, P. 1989. “Auctions and Bidding: A Primer.” Journal of Economic Perspectives 3: 3–22.
Nurmi, H. 1989. “Computational Approaches to Bargaining and Choice.” Journal of Theoretical Politics 1: 407–426.
Nurmi, H., and A. Salomaa. 1993a. “Cancellation and Reassignment of Votes in Secret Ballot Elections.” European Journal of Political Economy 9: 427–435.
Nurmi, H., and A. Salomaa. 1993b. “Cryptographic Protocols for Vickrey Auctions.” Group Decision and Negotiation 2: 363–373.
Nurmi, H., and A. Salomaa. 1993c. “The Nearly Perfect Auctioneer: Cryptographic Protocols for Auctions and Bidding.” Prepared for delivery at Conference on Decision Making: Towards 21st Century, Madrid, Spain, June 2–5.
Raiffa, H. 1982. The Art and Science of Negotiation. Cambridge, MA: Harvard University Press.
Riley, J.G. 1989. “Expected Revenue from Open and Sealed Bid Auctions.” Journal of Economic Perspectives 3: 41–50.
Rivest, R., A. Shamir, and L. Adleman. 1978. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” ACM Communications 21: 120–126.
Rothkopf, M.H., Th.J. Teisberg, and E.P. Kahn. 1990. “Why Are Vickrey Auctions Rare?” Journal of Political Economy 98: 94–109.
Salomaa, A. 1985. Computation and Automata. Cambridge: Cambridge University Press.
Salomaa, A. 1990. Public-Key Cryptography. Berlin-Heidelberg-New York: Springer-Verlag.
Vickrey, W. 1961. “Counter Speculation, Auctions and Competitive Sealed Tenders.” Journal of Finance 16: 8–37.
Yao, A. C. 1982. “Protocols for Secure Computation.” 23rd Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Nurmi, H. (1994). Cryptographic protocols for auctions and bargaining. In: Karhumäki, J., Maurer, H., Rozenberg, G. (eds) Results and Trends in Theoretical Computer Science. Lecture Notes in Computer Science, vol 812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58131-6_56
Download citation
DOI: https://doi.org/10.1007/3-540-58131-6_56
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-58131-4
Online ISBN: 978-3-540-48445-5
eBook Packages: Springer Book Archive