A Smart Card-Based Mental Poker System

  • Jordi Castellà-Roca
  • Josep Domingo-Ferrer
  • Francesc Sebé
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3928)


On-line casinos have experienced a great expansion since the generalized use of Internet started. There exist in the literature several proposals of systems allowing secure remote gaming. Nevertheless, the security requirements of some game families lead to the use of complex and costly cryptographic protocols. A particularly challenging game family is mental poker. In this paper we present a smart card-based e-gaming system for mental poker with a low computational cost.


Smart cards and applications in the Internet Cryptographic protocols for smart cards E-gambling Mental poker 


  1. 1.
    Aiello, W.A., Rubin, A.D., Strauss, M.J.: Using smartcards to secure a personalized gambling device. In: CCS 1999: Proceedings of the 6th ACM conference on Computer and communications security, pp. 128–137. ACM Press, New York (1999)Google Scholar
  2. 2.
    Barnett, A., Smart, N.P.: Mental poker revisited. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 370–383. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Crépeau, C.: A secure poker protocol that minimizes the effect of player coalitions. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 73–86. Springer, Heidelberg (1986)Google Scholar
  4. 4.
    Crépeau, C.: A zero-knowledge poker protocol that achieves confidentiality of the players’ strategy or how to achieve an electronic poker face. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 239–250. Springer, Heidelberg (1987)CrossRefGoogle Scholar
  5. 5.
    Department for Culture Media and Sport of Great Britain. Gambling review body, ch. 13, p. 167, July 17 (2001),
  6. 6.
    Edwards, J.: Implementating electronic poker: A practical exercise in zeroknowledge interactive proofs. Masters thesis, Department of Computer Science, University of Kentucky (May 1994)Google Scholar
  7. 7.
    Hall, C., Schneier, B.: Remote electronic gambling. In: 13th Annual Computer Security Applications Conference, pp. 227–230. ACM, New York (1997)Google Scholar
  8. 8.
    Needham, R.M., Schroeder, M.D.: Authentication revisited. ACM Operating Systems Review 21(1) (1987)Google Scholar
  9. 9.
    Oppliger, R., Nottaris, J.L.: Online casinos. Kommunikation in verteilten Systemen, 2–16 (1997)Google Scholar
  10. 10.
    Soo, W.H., Samsudin, A., Goh, A.: Efficient mental card shuffling via optimised arbitrary-sized benes permutation network. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 446–458. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Zhao, W., Varadharajan, V., Mu, Y.: Fair on-line gambling. In: 16th Annual Computer Security Applications Conference (ACSAC 2000), New Orleans, Louisiana, pp. 394–400. IEEE, Los Alamitos (2000)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2006

Authors and Affiliations

  • Jordi Castellà-Roca
    • 1
  • Josep Domingo-Ferrer
    • 1
  • Francesc Sebé
    • 1
  1. 1.Dept. of Computer Engineering and MathsRovira i Virgili University of TarragonaTarragona, Catalonia

Personalised recommendations