A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Mercury: a scalable publish-subscribe system for internet games
NetGames '02 Proceedings of the 1st workshop on Network and system support for games
An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs
ISC '01 Proceedings of the 4th International Conference on Information Security
Breaking Abstractions and Unstructuring Data Structures
ICCL '98 Proceedings of the 1998 International Conference on Computer Languages
An Efficient Synchronization Mechanism for Mirrored Game Architectures
Multimedia Tools and Applications
Low latency and cheat-proof event ordering for peer-to-peer games
NOSSDAV '04 Proceedings of the 14th international workshop on Network and operating systems support for digital audio and video
Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games
Proceedings of 3rd ACM SIGCOMM workshop on Network and system support for games
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
General secure multi-party computation from any linear secret-sharing scheme
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Multiparty computation with full computation power and reduced overhead
HASE'04 Proceedings of the Eighth IEEE international conference on High assurance systems engineering
A distributed architecture for multiplayer interactive applications on the Internet
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.24 |
This paper deals with massively multiplayer online services that are used for user interaction in real time. Although it is possible to distribute the load on a server to the users' computers, the distributed services are more vulnerable to cheating such as data theft. We propose a method for concealing the data from a user who is authorized to manage the data. The method makes it possible to carry out various kinds of operations, keeping both data and program codes concealed. We show that the concealed information cannot be figured out with the knowledge of the original programs or encoding keys possessed by the other users.