A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing
Complete characterization of security notions for probabilistic private-key encryption
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Pseudorandomness and Cryptographic Applications
Pseudorandomness and Cryptographic Applications
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Directed Acyclic Graphs, One-way Functions and Digital Signatures
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Offline architecture for real-time betting
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 2
Design and implementation of real-time betting system with offline terminals
Electronic Commerce Research and Applications
Hi-index | 0.00 |
We study lightweight and secure gambling methods, and propose a general framework that is secure against various "disconnection" and "payment refusal" attacks. Our method can be employed for single-and multi-player games in which players are independent, such as slot machines, roulette and blackjack. We focus on "open card" games, i.e., games where the casino's best game strategy is not affected by knowledge of the randomness used by the players (once both or all parties have committed to their random strings.) Our method allows players as well as casinos to ascertain that the game is played exactly according to the rules agreed on, including that the various random events in fact are random. Given the low computational costs involved, we can implement the games on cellular phones, without concerns of excessive computation or power consumption.