Cross-Chain Sealed-Bid Auctions Using Confidential Compute Blockchains
- URL: http://arxiv.org/abs/2510.19491v1
- Date: Wed, 22 Oct 2025 11:35:51 GMT
- Title: Cross-Chain Sealed-Bid Auctions Using Confidential Compute Blockchains
- Authors: Jonas Gebele, Timm Mutzel, Burak Oez, Florian Matthes,
- Abstract summary: Sealed-bid auctions ensure fair competition and efficient allocation but are often deployed on centralized infrastructure.<n>Public blockchains eliminate central control, yet their inherent transparency conflicts with the confidentiality required for sealed bidding.<n>We present a sealed-bid auction protocol that executes sensitive bidding logic on a confidential compute blockchain.
- Score: 12.944520640892316
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Sealed-bid auctions ensure fair competition and efficient allocation but are often deployed on centralized infrastructure, enabling opaque manipulation. Public blockchains eliminate central control, yet their inherent transparency conflicts with the confidentiality required for sealed bidding. Prior attempts struggle to reconcile privacy, verifiability, and scalability without relying on trusted intermediaries, multi-round protocols, or expensive cryptography. We present a sealed-bid auction protocol that executes sensitive bidding logic on a Trusted Execution Environment (TEE)-backed confidential compute blockchain while retaining settlement and enforcement on a public chain. Bidders commit funds to enclave-generated escrow addresses, ensuring confidentiality and binding commitments. After the deadline, any party can trigger resolution: the confidential blockchain determines the winner through verifiable off-chain computation and issues signed settlement transactions for execution on the public chain. Our design provides security, privacy, and scalability without trusted third parties or protocol modifications. We implement it on SUAVE with Ethereum settlement, evaluate its scalability and trust assumptions, and demonstrate deployment with minimal integration on existing infrastructure
Related papers
- RAIN: Secure and Robust Aggregation under Shuffle Model of Differential Privacy [46.52109845749167]
We present Robust Aggregation in Noise (RAIN), a framework that reconciles privacy, robustness, and verifiability under Shuffle-DP.<n>RAIN adopts sign-space aggregation to robustly measure update consistency and limit malicious influence under noise and anonymization.<n>We show that RAIN maintains strong privacy guarantees under Shuffle-DP and remains robust to poisoning attacks with negligible degradation in accuracy and convergence.
arXiv Detail & Related papers (2026-03-03T15:41:54Z) - Your Privacy Depends on Others: Collusion Vulnerabilities in Individual Differential Privacy [50.66105844449181]
Individual Differential Privacy (iDP) promises users control over their privacy, but this promise can be broken in practice.<n>We reveal a previously overlooked vulnerability in sampling-based iDP mechanisms.<n>We propose $(varepsilon_i,_i,overline)$-iDP a privacy contract that uses $$-divergences to provide users with a hard upper bound on their excess vulnerability.
arXiv Detail & Related papers (2026-01-19T10:26:12Z) - zk-Agreements: A Privacy-Preserving Way to Establish Deterministic Trust in Confidential Agreements [4.484708810630883]
We introduce zk-agreements, a protocol designed to transition from paper-based trust to cryptographic trust while preserving confidentiality.<n>Our design combines zero-knowledge proofs to protect private agreement terms, secure two-party computation to enable private compliance evaluation, and smart contracts to guarantee automated enforcement.
arXiv Detail & Related papers (2025-10-22T20:11:57Z) - Confidential Wrapped Ethereum [0.0]
The proposal suggests creating a confidential version of wrapped (cWETH) fully within the application layer.<n>The solution combines the Elliptic Curve (EC) Twisted ElGamal-based commitment scheme to preserve confidentiality.<n>To enforce the correct generation of commitments, encryption, and decryption, zk-SNARKs are utilized.
arXiv Detail & Related papers (2025-07-12T10:00:50Z) - Novel Blockchain-based Protocols for Electronic Voting and Auctions [0.0]
We consider several decentralized protocols to be built on blockchains, specifically using smart contracts on smart contracts.<n>We proposed a new approach called Blind Vote, which is untraceable, secure, efficient, secrecy-preserving, and fully on-chain electronic voting protocol.<n>On the other hand, we propose a new family of algorithms for private, trustless auctions that protect bidder identities and bid values.
arXiv Detail & Related papers (2025-07-04T02:26:04Z) - Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems [43.253676241213626]
We propose an architecture for blockchain-based PAISs to preserve confidentiality and transparency.<n>Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.<n>We assess the security of our solution through a systematic threat model analysis and evaluate its practical feasibility.
arXiv Detail & Related papers (2024-12-07T20:18:36Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.<n>Our measurements from the Aptos mainnet show that the optimistic approach reduces latency overhead by 71%.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Enabling Data Confidentiality with Public Blockchains [5.749927436954179]
Multi-Authority Approach to Transaction Systems for Interoperating Applications (MARTSIA)
MARTSIA enables read-access control over shared data at the level of message parts.
Based on Multi-Authority Attribute-Based Encryption (MA-ABE), MARTSIA enables read-access control over shared data at the level of message parts.
arXiv Detail & Related papers (2023-08-04T13:21:48Z) - Regulation conform DLT-operable payment adapter based on trustless -
justified trust combined generalized state channels [77.34726150561087]
Economy of Things (EoT) will be based on software agents running on peer-to-peer trustless networks.
We give an overview of current solutions that differ in their fundamental values and technological possibilities.
We propose to combine the strengths of the crypto based, decentralized trustless elements with established and well regulated means of payment.
arXiv Detail & Related papers (2020-07-03T10:45:55Z) - Short Paper: Design and Evaluation of Privacy-preserved Supply Chain
System based on Public Blockchain [1.2495265936084994]
We propose a method for preserving privacy while securing traceability in a supply chain system using public blockchain (PBC)
The proposed method preserves privacy by concealing the distribution information via encryption.
We implement the proposed method on smart contracts and evaluate cost performance based on transaction fees.
arXiv Detail & Related papers (2020-04-16T11:30:39Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.