In this note, we report on the first large-scale and practical application of multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used.
In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, threshold cryptography and security engineering to implement secure auctions for practical real-world problems.
In this note, we briefly report on the first large-scale and practical application of multiparty computation, which took place in January 2008.
We report on the design and implementation of a system that uses mul-tiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks' and the consultancy house's data stays confidential, the… (More)
We discuss the design of multi-dimensional tender and auction mechanisms that combine Data Envelopment Analysis (DEA) and auction theory. The mechanisms select an agent to perform or acquire a project characterized by multiple attributes. The optimal configuration of the multiple attributes is settled endogenously by trading off the costs to the provider… (More)