Playing Lottery on the Internet
The Internet is used by more and more people for personal and business related communication. This paper presents an integrated scheme for playing lottery on the Internet, which includes purchase of tickets, generation of winning number, and claiming of prize. Fairness between the customer and the service provider is maintained at the stages of purchasing tickets and claiming prize. The customer’s identity is kept anonymous to the service provider. The sum of sold tickets and the sum of winning tickets are publicly verifiable. The winning number is generated randomly but verifiably. These features will increase the customer’s trust in the Internet lottery service.
Unable to display preview. Download preview PDF.
- 1.N. Asokan, V. Shoup and M. Waidner. Optimistic fair exchange of digital signatures. Lecture Notes in Computer Science 1403, Advances in Cryptology: Proceedings of Eurocrypt’98, pages 591–606, Helsinki, Finland, June 1998.Google Scholar
- 2.G. Ateniese. Efficient verifiable encryption (and fair exchange) of digital signatures. Proceedings of 6th ACM Conference on Computer and Communications Security, pages 138–146, Singapore, November 1999.Google Scholar
- 3.F. Bao, R. H. Deng and W. Mao. Efficient and practical fair exchange protocols with off-line TTP. Proceedings of 1998 IEEE Symposium on Security and Privacy, pages 77–85, Oakland, California, May 1998.Google Scholar
- 5.J. Camenisch, U. Maurer and M. Stadler. Digital payment systems with passive anonymity-revoking trustees. Lecture Notes in Computer Science 1146, Computer Security: Proceedings of 1996 European Symposium on Research in Computer Security, pages 33–43, Rome, September 1996.Google Scholar
- 6.G. Davida, Y. Frankel, Y. Tsiounis and M. Yung. Anonymity control in e-cash systems. Lecture Notes in Computer Science 1318, Proceedings of 1997 Financial Cryptography, pages 1–16, Anguilla BWI, February 1997.Google Scholar
- 8.D. M. Goldschlag and S. G. Stubblebine. Publicly verifiable lotteries: Applications of delaying functions. Lecture Notes in Computer Science 1465, Proceedings of 1998 Financial Cryptography, Anguilla BWI, February 1998.Google Scholar
- 9.L. C. Guillou and J. J. Quisquater. A paradoxical identity-based signature scheme resulting from zero-knowledge. Lecture Notes in Computer Science 403, Advances in Cryptology: Proceedings of Crypto’88, pages 216–231, Santa Barbara, California, August 1988.Google Scholar
- 10.R. Rivest. Electronic lottery tickets as micropayments. Lecture Notes in Computer Science 1318, Proceedings of 1997 Financial Cryptography, pages 307–314, Anguilla BWI, February 1997.Google Scholar
- 11.K. Sako. Implementation of a digital lottery server on WWW. Lecture Notes in Computer Science 1740, Proceedings of CQRE’99, pages 101–108, Dusseldorf, Germany, December 1999.Google Scholar
- 12.P. Syverson. Weakly secret bit commitment: Applications to lotteries and fair exchange. Proceedings of 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, June 1998.Google Scholar
- 13.E. Van Herreweghen. Secure anonymous signature-based transactions. Lecture Notes in Computer Science 1895, Computer Security: Proceedings of 2000 European Symposium on Research in Computer Security, pages 55–71, Toulouse, France, October 2000.Google Scholar