Skip to main content

Table 2 The properties of our scheme and the schemes proposed in [16, 17]

From: Privacy-preserving combinatorial auction without an auctioneer

Properties Our scheme Scheme in [17] Scheme in [16]
Resist the evaluators Yes No No
cheating activity    
Secure channel No Yes Yes
Verifiable Yes Yes No
Efficient reconstruction Yes Yes Yes
and trace    
The reusability of the Yes No No
secret shadow    
Third party No Yes Yes
Select the secret shadow Yes No No
by the evaluators