Skip to main content

Table 2 The properties of our scheme and the schemes proposed in [16, 17]

From: Privacy-preserving combinatorial auction without an auctioneer

Properties

Our scheme

Scheme in [17]

Scheme in [16]

Resist the evaluators

Yes

No

No

cheating activity

   

Secure channel

No

Yes

Yes

Verifiable

Yes

Yes

No

Efficient reconstruction

Yes

Yes

Yes

and trace

   

The reusability of the

Yes

No

No

secret shadow

   

Third party

No

Yes

Yes

Select the secret shadow

Yes

No

No

by the evaluators