Attacking Privacy in a Fully Private Auction Protocol - Archive ouverte HAL Accéder directement au contenu
Rapport Année : 2012

Attacking Privacy in a Fully Private Auction Protocol

Résumé

Auctions have a long history, having been recorded as early as 500 B.C. With the rise of Internet, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. In 2006, Brandt developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. that no information apart from the winner and the winning price is leaked. We show that this protocol -- when using interactive zero-knowledge proofs -- is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants' bids. Additionally, even if non-interactive zero-knowledge proofs are used, we show that the protocol is vulnerable to a different attack, which allows to recover one targeted bidder's bid.
Fichier principal
Vignette du fichier
main.pdf (270.43 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-00745247 , version 1 (25-10-2012)
hal-00745247 , version 2 (08-04-2013)
hal-00745247 , version 3 (14-05-2013)

Identifiants

Citer

Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade. Attacking Privacy in a Fully Private Auction Protocol. 2012. ⟨hal-00745247v1⟩
425 Consultations
383 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More