Playing Lottery on the Internet

  • Jianying Zhou
  • Chunfu Tan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2229)

Abstract

The Internet is used by more and more people for personal and business related communication. This paper presents an integrated scheme for playing lottery on the Internet, which includes purchase of tickets, generation of winning number, and claiming of prize. Fairness between the customer and the service provider is maintained at the stages of purchasing tickets and claiming prize. The customer’s identity is kept anonymous to the service provider. The sum of sold tickets and the sum of winning tickets are publicly verifiable. The winning number is generated randomly but verifiably. These features will increase the customer’s trust in the Internet lottery service.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    N. Asokan, V. Shoup and M. Waidner. Optimistic fair exchange of digital signatures. Lecture Notes in Computer Science 1403, Advances in Cryptology: Proceedings of Eurocrypt’98, pages 591–606, Helsinki, Finland, June 1998.Google Scholar
  2. 2.
    G. Ateniese. Efficient verifiable encryption (and fair exchange) of digital signatures. Proceedings of 6th ACM Conference on Computer and Communications Security, pages 138–146, Singapore, November 1999.Google Scholar
  3. 3.
    F. Bao, R. H. Deng and W. Mao. Efficient and practical fair exchange protocols with off-line TTP. Proceedings of 1998 IEEE Symposium on Security and Privacy, pages 77–85, Oakland, California, May 1998.Google Scholar
  4. 4.
    M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, E. Van Herreweghen and M. Waidner. Design, implementation and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communications, 18(4):611–627, April 2000.CrossRefGoogle Scholar
  5. 5.
    J. Camenisch, U. Maurer and M. Stadler. Digital payment systems with passive anonymity-revoking trustees. Lecture Notes in Computer Science 1146, Computer Security: Proceedings of 1996 European Symposium on Research in Computer Security, pages 33–43, Rome, September 1996.Google Scholar
  6. 6.
    G. Davida, Y. Frankel, Y. Tsiounis and M. Yung. Anonymity control in e-cash systems. Lecture Notes in Computer Science 1318, Proceedings of 1997 Financial Cryptography, pages 1–16, Anguilla BWI, February 1997.Google Scholar
  7. 7.
    T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31(4):469–472, July 1985.CrossRefMathSciNetGoogle Scholar
  8. 8.
    D. M. Goldschlag and S. G. Stubblebine. Publicly verifiable lotteries: Applications of delaying functions. Lecture Notes in Computer Science 1465, Proceedings of 1998 Financial Cryptography, Anguilla BWI, February 1998.Google Scholar
  9. 9.
    L. C. Guillou and J. J. Quisquater. A paradoxical identity-based signature scheme resulting from zero-knowledge. Lecture Notes in Computer Science 403, Advances in Cryptology: Proceedings of Crypto’88, pages 216–231, Santa Barbara, California, August 1988.Google Scholar
  10. 10.
    R. Rivest. Electronic lottery tickets as micropayments. Lecture Notes in Computer Science 1318, Proceedings of 1997 Financial Cryptography, pages 307–314, Anguilla BWI, February 1997.Google Scholar
  11. 11.
    K. Sako. Implementation of a digital lottery server on WWW. Lecture Notes in Computer Science 1740, Proceedings of CQRE’99, pages 101–108, Dusseldorf, Germany, December 1999.Google Scholar
  12. 12.
    P. Syverson. Weakly secret bit commitment: Applications to lotteries and fair exchange. Proceedings of 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, June 1998.Google Scholar
  13. 13.
    E. Van Herreweghen. Secure anonymous signature-based transactions. Lecture Notes in Computer Science 1895, Computer Security: Proceedings of 2000 European Symposium on Research in Computer Security, pages 55–71, Toulouse, France, October 2000.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Jianying Zhou
    • 1
  • Chunfu Tan
    • 2
  1. 1.Oracle CorporationRedwood ShoresUSA
  2. 2.Kent Ridge Digital LabsTerraceSingapore

Personalised recommendations