M. Abe and K. Suzuki, M + 1-st Price Auction Using Homomorphic Encryption, Public Key Cryptology, pp.115-124, 2002.
DOI : 10.1007/3-540-45664-3_8

C. Cachin, Efficient private bidding and auctions with an oblivious third party Also available as http, the 6th ACM Conference on Computer and Communications Security, 1999.
DOI : 10.1145/319709.319726

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.2933

R. Cramer, I. Damgård, and J. Nielsen, Multiparty Computation from Threshold Homomorphic Encryption, EUROCRYPT '01, pp.280-299, 2001.
DOI : 10.1007/3-540-44987-6_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.5028

M. Jakobsson and A. Juels, Mix and Match: Secure Function Evaluation via Ciphertexts, ASIACRYPT '00, pp.143-161, 1976.
DOI : 10.1007/3-540-44448-3_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.5051

A. Juels and M. Szydlo, A Two-Server, Sealed-Bid Auction Protocol, The Sixth International Conference on Financial Cryptography, pp.72-86, 2002.
DOI : 10.1007/3-540-36504-4_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.7928

H. Kikuchi, M. Harkavy, and J. Tygar, Multi-round anonymous auction, Proceedings of the First IEEE Workshop on Dependable and Real-Time E- Commerce Systems, pp.62-69, 1998.

H. Kikuchi, S. Hotta, K. Abe, and S. Nakanishi, Distributed auction servers resolving winner and winning bid without revealing privacy of bids, Proceedings Seventh International Conference on Parallel and Distributed Systems: Workshops, pp.307-312, 2000.
DOI : 10.1109/PADSW.2000.884610

K. Kurosawa and W. Ogata, Bit-Slice Auction Circuit, 7th European Symposium on Research in Computer Security, ESORICS2002, volume 2502 of Lecture Notes in Computer Science, pp.24-38, 2002.
DOI : 10.1007/3-540-45853-0_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.6842

M. Naor, B. Pinkas, and R. Sumner, Privacy perserving auctions and mechanism design, ACM Conference on Electronic Commerce, pp.129-139, 1999.
DOI : 10.1145/336992.337028

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.7459

K. Omote and A. Miyaji, A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root, In Financial Cryptography Lecture Notes in Computer Science, vol.2357, pp.57-71, 2002.
DOI : 10.1007/3-540-36504-4_5

K. Peng, C. Boyd, and E. Dawson, A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption, ISC 2005, pp.374-388, 2005.
DOI : 10.1007/11556992_27

K. Peng, C. Boyd, and E. Dawson, Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing, Mycrypt 2005, pp.84-98, 2005.
DOI : 10.1007/11554868_7

K. Peng, C. Boyd, E. Dawson, and K. Viswanathan, Non-interactive Auction Scheme with Strong Privacy, 5th International Conference of Information Security and Cryptology -ICISC 2002, pp.407-420, 2002.
DOI : 10.1007/3-540-36552-4_28

URL : http://eprints.qut.edu.au/24607/1/Non-Interactive_Auction_Scheme_with_Strong_Privacy.pdf

K. Peng, C. Boyd, E. Dawson, and K. Viswanathan, Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction, 4th International Conference of Information and Communications Security, pp.147-159, 2002.
DOI : 10.1007/3-540-36159-6_13

K. Peng and F. Bao, Efficiency Improvement of Homomorphic E-Auction, TRUST- BUS '10, LNCS6264, pp.238-249
DOI : 10.1007/978-3-642-15152-1_21

K. Sako, An auction scheme which hides the bids of losers, Public Key Cryptology, pp.422-432, 2000.

K. Sakurai and S. Miyazaki, A bulletin-board based digital auction scheme with bidding down strategy -towards anonymous electronic bidding without anonymous channels nor trusted centers, Proc. International Workshop on Cryptographic Techniques and E-Commerce, pp.180-187, 1999.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

K. Suzuki, K. Kobayashi, and H. Morita, Efficient Sealed-bid Auction using Hash Chain, International Conference on Information Security and Cryptology, pp.183-191, 2000.
DOI : 10.1007/3-540-45247-8_15

Y. Watanabe and H. Imai, Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.80-86, 2000.
DOI : 10.1145/352600.352612