Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

20 Scopus Citations
View graph of relations

Author(s)

Detail(s)

Original languageEnglish
Pages (from-to)113-128
Journal / PublicationWireless Networks
Volume18
Issue number2
Publication statusPublished - Feb 2012
Externally publishedYes

Abstract

Spectrum auction is an enabling technology for improving the spectrum efficiency of unused licensed bands (white spaces) in wireless networks. However, the back-room dealing (i.e., the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) poses serious security challenges, leading to failures of all existing secure auction designs in allocating spectrum bands. In this paper, we propose a secure combinatorial spectrum auction (SCSA) by utilizing homomorphic encryption to prevent the backroom dealing. The idea in SCSA is to incorporate cryptographic techniques into the spectrum auction to address the frauds and bid-rigging. It computes and reveals the results of spectrum auction while the actual bidding values of bidders are kept confidential. SCSA also provides a corresponding procedure in implementing the combinatorial spectrum auction under the interference constraints. We show that compared with existing secure spectrum auction designs against the untrustworthy auctioneer, SCSA is much more efficient in both communication and computational complexity; and compared with other spectrum auction designs with security consideration, SCSA can effectively thwart the back-room dealings due to the untrustworthy auctioneer without too much performance degradation. © Springer Science+Business Media, LLC 2011.

Research Area(s)

  • Cognitive radio, Homomorphic encryption, Secure spectrum auctions, Untrustworthy auctioneer

Bibliographic Note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].