Abstract
Government has the authority to operate lottery schemes. Since the operation of the lottery system is controlled by the government, there are issues with public trust. The people may speculate that the lottery is rigged. This issue becomes critical with an online lottery system since the unprotected data can be easy manipulated. If all combinations which have been sold are known before the drawing, the government may draw winning numbers which pay the least. Moreover, winning tickets may be added after the drawing. As a result, corruption may be inevitable. The government should operate lottery schemes with integrity which include transparency and accountability.
This paper presents the design and the implementation of a secure online lottery system. The proposed system can provide accuracy, privacy, transparency, and verifiability. Using the proposed system, the government can operate lottery schemes with integrity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Title 44 of the United States Code § 3542 (b) (1), United States Government Printing Office (2008)
U.S. Department of Commerce/National Institute of Standards and Technology (NIST), Standards for Security Categorization of Federal Information and Information Systems (FIPS PUB 199) (2004)
What is good governance? UNESCAP (2009), http://www.unescap.org/pdd/prs/ProjectActivities/Ongoing/gg/governance.asp
World Lottery Association, The World Lottery Association Values, http://www.world-lotteries.org/
The Internet Engineering Task Force (IETF), Internet Security Glossary, RFC 2828 (2000)
lottery, in Encyclopædia Britannica, Encyclopædia Britannica Online (2009), http://www.britannica.com/EBchecked/topic/348555/lottery
Zhou, J., Tan, C.: Playing Lottery on the Internet. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 189–201. Springer, Heidelberg (2001)
Liu, Y., et al.: A New Efficient E-Lottery Scheme Using Multi-Level Hash Chain. In: International Conference on Communication Technology, pp. 1–4 (2006)
Goldschlag, D.M., Stubblebine, S.G.: Publicly Verifiable Lotteries: Applications of Delaying Functions. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 214–226. Springer, Heidelberg (1998)
Sako, K.: Implementation of a Digital Lottery Server on WWW. In: Baumgart, R. (ed.) CQRE 1999. LNCS, vol. 1740, pp. 101–108. Springer, Heidelberg (1999)
The International Telecommunication Union (ITU), Data Communication Network: Open Systems Interconnection (OSI); Security, Structure and Applications (1991)
Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World, 2nd edn. Prentice Hall PTR, Upper Saddle River (2002)
Stallings, W.: Cryptography and Network Security, 4th edn. Prentice Hall, Upper Saddle River (2006)
Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC, New York (2007)
U.S. Department of Commerce/National Institute of Standards and Technology (NIST), Data Encryption Standard (DES) (FIPS PUB 46-3) (1999)
Hevia, A., Kiwi, M.: Strength of Two Data Encryption Standard Implementations under Timing Attacks. ACM Transactions on Information and System Security 2(4), 416–437 (1999)
U.S. Department of Commerce/ National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES) (FIPS PUB 197) (2001)
RSA Cryptography Standard, PKCS #1 v2.1. (2002)
Chaum, D.: Blind Signatures for Untraceable Payments. In: Advances in Cryptology: Proceedings of Crypto, pp. 199–203 (1982)
Gao, J.Z., Prakash, L., Jagatesan, R.: Understanding 2D-Barcode Technology and Applications in M Commerce–Design and Implementation of a 2D Barcode Processing Solution. In: 31st Annual International Conference on Computer Software and Applications, vol. 2, pp. 49–56 (2007)
QR Code, http://www.denso-wave.com/qrcode/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kuacharoen, P. (2012). Design and Implementation of a Secure Online Lottery System. In: Papasratorn, B., Charoenkitkarn, N., Lavangnananda, K., Chutimaskul, W., Vanijja, V. (eds) Advances in Information Technology. IAIT 2012. Communications in Computer and Information Science, vol 344. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35076-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-35076-4_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35075-7
Online ISBN: 978-3-642-35076-4
eBook Packages: Computer ScienceComputer Science (R0)