Print Email Facebook Twitter Practical Verifiable & Privacy-Preserving Double Auctions Title Practical Verifiable & Privacy-Preserving Double Auctions Author Memar Zahedani, Armin (Student TU Delft) Vos, J.V. (TU Delft Cyber Security) Erkin, Z. (TU Delft Cyber Security) Date 2023 Abstract Double auctions are procedures to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Buyers and sellers inform the auctioneer what quantity they want to buy or sell at specific prices. The auctioneer aggregates these offers into demand and supply curves and finds the intersection representing the optimal price. In this way, commodities exchange owners in an economically-efficient manner. Ideally, the auctioneer is a trusted third party that does not abuse the information they gain. However, the offers reveal sensitive information about the traders, which the auctioneer may use for economic gain as insider information. These concerns are not theoretical; investigations against auctioneers in electricity and advertisement auctions for manipulating auctions are ongoing. These concerns call for solutions that conduct double auctions in a privacy-preserving and verifiable way. However, current solutions are impractical: To the best of our knowledge, the only solutions satisfying these properties require full interaction of all participants. In this work, we design a more practical solution. We propose the first privacy-preserving and verifiable double auction scheme that does not require traders to interact actively, tailored to electricity trading on (inter)national exchanges. Our solution relies on homomorphic encryption, commitments, and zero-knowledge proofs. In a simulated auction with 256 traders, we observe that traders take up to 10 seconds to generate their order, the auctioneer takes 10 seconds to verify an order, and the auction result is computed and verified in 30 seconds. We extrapolate these results to larger auctions to show the practical potential. Subject Homomorphic EncryptionPeriodic Double AuctionsPrivacyZero-knowledge Proofs To reference this document use: http://resolver.tudelft.nl/uuid:38aa5658-5ac0-4af1-9148-6059e7da86b0 DOI https://doi.org/10.1145/3600160.3600190 Publisher Association for Computing Machinery (ACM) Embargo date 2024-02-05 ISBN 9798400707728 Source ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings Event 18th International Conference on Availability, Reliability and Security, ARES 2023, 2023-08-29 → 2023-09-01, Benevento, Italy Series ACM International Conference Proceeding Series Bibliographical note Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public. Part of collection Institutional Repository Document type conference paper Rights © 2023 Armin Memar Zahedani, J.V. Vos, Z. Erkin Files PDF 3600160.3600190.pdf 879.05 KB Close viewer /islandora/object/uuid:38aa5658-5ac0-4af1-9148-6059e7da86b0/datastream/OBJ/view