Privacy-Preserving Strategyproof Auction Mechanisms for Resource Allocation in Wireless Communications

Author(s):  
Yu-E Sun ◽  
He Huang ◽  
Xiang-Yang Li ◽  
Yang Du ◽  
Miaomiao Tian ◽  
...  
2017 ◽  
Vol 22 (2) ◽  
pp. 119-134 ◽  
Author(s):  
Yu-E Sun ◽  
He Huang ◽  
Xiang-Yang Li ◽  
Yang Du ◽  
Miaomiao Tian ◽  
...  

2010 ◽  
Vol 3 (2) ◽  
pp. 83-90
Author(s):  
Guan Y. Ru ◽  
Hong X. Li ◽  
Guo Q. Li ◽  
Si Q. Liu

2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Mingwu Zhang ◽  
Bingruolan Zhou

Combinatorial auctions can be employed in the fields such as spectrum auction, network routing, railroad segment, and energy auction, which allow multiple goods to be sold simultaneously and any combination of goods to be bid and the maximum sum of combinations of bidding prices to be calculated. However, in traditional combinatorial auction mechanisms, data concerning bidders’ price and bundle might reveal sensitive information, such as personal preference and competitive relation since the winner determination problem needs to be resolved in terms of sensitive data as above. In order to solve this issue, this paper exploits a privacy-preserving and verifiable combinatorial auction protocol (PP-VCA) to protect bidders’ privacy and ensure the correct auction price in a secure manner, in which we design a one-way and monotonically increasing function to protect a bidder’s bid to enable the auctioneer to pick out the largest bid without revealing any information about bids. Moreover, we design and employ three subprotocols, namely, privacy-preserving winner determination protocol, privacy-preserving scalar protocol, and privacy-preserving verifiable payment determination protocol, to implement the combinatorial auction with bidder privacy and payment verifiability. The results of comprehensive experimental evaluations indicate that our proposed scheme provides a better efficiency and flexibility to meet different types of data volume in terms of the number of goods and bidders.


2011 ◽  
Vol 10 (2) ◽  
pp. 431-436 ◽  
Author(s):  
Daojing He ◽  
Jiajun Bu ◽  
Sammy Chan ◽  
Chun Chen ◽  
Mingjian Yin

2020 ◽  
Author(s):  
Ping Li ◽  
Yu Liu ◽  
Xiang Gao ◽  
Huibo Li ◽  
Peng Gong

Abstract Energy efficiency and privacy preserving have become essential for the wireless sensor networks. In the previous work, an optimal power allocation algorithm was investigated for a non-selfish symbiotic cognitive relaying scheme (NSCRS) in the sensor network with coexistence of a primary user (PU) and cognitive users (CUs). However, the optimal strategy of energy and time resource allocation as well as the privacy preserving was not considered. In this paper, we further consider the joint energy and time resource allocation problem for the cognitive users in NSCRS to maximize the overall capacity of the primary user and cognitive users with the consideration of information privacy under the energy constraints of cognitive users. With full channel state information (CSI), i.e., PU s -PU d , PU s -CUs and CUs-PU d , an optimal energy and time resource allocation algorithm is proposed based on the exhaustive searching. In order to reduce the overhead of CSI feedback, a suboptimal algorithm, in which only the instantaneous CSI of PU s -PU d , the instantaneous CSI of PU s -CUs and an averaged CSI of CUs-PU d by long term observation rather than an instantaneous value of CSI of CUs-PU d are required, is additionally proposed. Simulation results demonstrate the energy efficiency of primary and cognitive users in the NSCRS with consideration of information privacy can be greatly improved by the proposed algorithms.


Sign in / Sign up

Export Citation Format

Share Document