Publicly Verifiable Lotteries: Applications of Delaying Functions
FC '98 Proceedings of the Second International Conference on Financial Cryptography
An e-lottery scheme using verifiable random function
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Video streaming security: reliable hash chain mechanism using redundancy codes
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Hash chain links resynchronization methods in video streaming security: performance comparison
Journal of Mobile Multimedia
Hi-index | 0.00 |
A multi-level hash chain structure is employed to improve a fair e-lottery scheme which ensures secure winning number generation and verification and to make verification more efficient. In addition, an implementation of a delaying function based on a secure hash function is presented.