A privacy preserving truthful spectrum auction scheme using homomorphic encryption

Xiaoyan Wang, Yusheng Ji, Hao Zhou, Zhi Liu, Yu Gu, Jie Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Abstract

Dynamic spectrum reallocation, under which the spectrum owners temporarily share the underutilized spectrum to secondary users for economic profit, is an important approach to improve the spectrum utilization ratio. Auction is believed to be a natural marketing tool to incentivize the spectrum owners, and thus redistribute the idle spectrum efficiently. Extensive researches have been done in the problem of truthful spectrum auction, in which the bidders bid based on their true valuations of the spectrum. The true valuation of the individual bidder, however, is a private information which should be protected against exposure. In this paper, we propose a privacy preserving truthful spectrum auction scheme by utilizing homomorphic encryption. The proposed scheme reveals the group bids but hides the users' bids even from the auctioneer. The evaluation results show that the proposed scheme achieves good spectrum utilization efficiency with low communication and computation overheads.

Original languageEnglish
Title of host publication2015 IEEE Global Communications Conference, GLOBECOM 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781479959525
DOIs
Publication statusPublished - 2016 Feb 23
Event58th IEEE Global Communications Conference, GLOBECOM 2015 - San Diego, United States
Duration: 2015 Dec 62015 Dec 10

Other

Other58th IEEE Global Communications Conference, GLOBECOM 2015
Country/TerritoryUnited States
CitySan Diego
Period15/12/615/12/10

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Communication

Fingerprint

Dive into the research topics of 'A privacy preserving truthful spectrum auction scheme using homomorphic encryption'. Together they form a unique fingerprint.

Cite this