Skip to main content

Playing Lottery on the Internet

Part of the Lecture Notes in Computer Science book series (LNCS,volume 2229)

Abstract

The Internet is used by more and more people for personal and business related communication. This paper presents an integrated scheme for playing lottery on the Internet, which includes purchase of tickets, generation of winning number, and claiming of prize. Fairness between the customer and the service provider is maintained at the stages of purchasing tickets and claiming prize. The customer’s identity is kept anonymous to the service provider. The sum of sold tickets and the sum of winning tickets are publicly verifiable. The winning number is generated randomly but verifiably. These features will increase the customer’s trust in the Internet lottery service.

Keywords

  • Service Provider
  • Lottery Ticket
  • Cipher Text
  • Fair Exchange
  • Hash Chain

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/3-540-45600-7_22
  • Chapter length: 13 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   99.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-45600-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   129.00
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Asokan, V. Shoup and M. Waidner. Optimistic fair exchange of digital signatures. Lecture Notes in Computer Science 1403, Advances in Cryptology: Proceedings of Eurocrypt’98, pages 591–606, Helsinki, Finland, June 1998.

    Google Scholar 

  2. G. Ateniese. Efficient verifiable encryption (and fair exchange) of digital signatures. Proceedings of 6th ACM Conference on Computer and Communications Security, pages 138–146, Singapore, November 1999.

    Google Scholar 

  3. F. Bao, R. H. Deng and W. Mao. Efficient and practical fair exchange protocols with off-line TTP. Proceedings of 1998 IEEE Symposium on Security and Privacy, pages 77–85, Oakland, California, May 1998.

    Google Scholar 

  4. M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, E. Van Herreweghen and M. Waidner. Design, implementation and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communications, 18(4):611–627, April 2000.

    CrossRef  Google Scholar 

  5. J. Camenisch, U. Maurer and M. Stadler. Digital payment systems with passive anonymity-revoking trustees. Lecture Notes in Computer Science 1146, Computer Security: Proceedings of 1996 European Symposium on Research in Computer Security, pages 33–43, Rome, September 1996.

    Google Scholar 

  6. G. Davida, Y. Frankel, Y. Tsiounis and M. Yung. Anonymity control in e-cash systems. Lecture Notes in Computer Science 1318, Proceedings of 1997 Financial Cryptography, pages 1–16, Anguilla BWI, February 1997.

    Google Scholar 

  7. T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31(4):469–472, July 1985.

    CrossRef  MathSciNet  Google Scholar 

  8. D. M. Goldschlag and S. G. Stubblebine. Publicly verifiable lotteries: Applications of delaying functions. Lecture Notes in Computer Science 1465, Proceedings of 1998 Financial Cryptography, Anguilla BWI, February 1998.

    Google Scholar 

  9. L. C. Guillou and J. J. Quisquater. A paradoxical identity-based signature scheme resulting from zero-knowledge. Lecture Notes in Computer Science 403, Advances in Cryptology: Proceedings of Crypto’88, pages 216–231, Santa Barbara, California, August 1988.

    Google Scholar 

  10. R. Rivest. Electronic lottery tickets as micropayments. Lecture Notes in Computer Science 1318, Proceedings of 1997 Financial Cryptography, pages 307–314, Anguilla BWI, February 1997.

    Google Scholar 

  11. K. Sako. Implementation of a digital lottery server on WWW. Lecture Notes in Computer Science 1740, Proceedings of CQRE’99, pages 101–108, Dusseldorf, Germany, December 1999.

    Google Scholar 

  12. P. Syverson. Weakly secret bit commitment: Applications to lotteries and fair exchange. Proceedings of 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, June 1998.

    Google Scholar 

  13. E. Van Herreweghen. Secure anonymous signature-based transactions. Lecture Notes in Computer Science 1895, Computer Security: Proceedings of 2000 European Symposium on Research in Computer Security, pages 55–71, Toulouse, France, October 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, J., Tan, C. (2001). Playing Lottery on the Internet. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7_22

Download citation

  • DOI: https://doi.org/10.1007/3-540-45600-7_22

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42880-0

  • Online ISBN: 978-3-540-45600-1

  • eBook Packages: Springer Book Archive