Design and Implementation of a Secure Online Lottery System

  • Pramote Kuacharoen
Part of the Communications in Computer and Information Science book series (CCIS, volume 344)

Abstract

Government has the authority to operate lottery schemes. Since the operation of the lottery system is controlled by the government, there are issues with public trust. The people may speculate that the lottery is rigged. This issue becomes critical with an online lottery system since the unprotected data can be easy manipulated. If all combinations which have been sold are known before the drawing, the government may draw winning numbers which pay the least. Moreover, winning tickets may be added after the drawing. As a result, corruption may be inevitable. The government should operate lottery schemes with integrity which include transparency and accountability.

This paper presents the design and the implementation of a secure online lottery system. The proposed system can provide accuracy, privacy, transparency, and verifiability. Using the proposed system, the government can operate lottery schemes with integrity.

Keywords

Online lottery system secure online lottery system information security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Title 44 of the United States Code § 3542 (b) (1), United States Government Printing Office (2008) Google Scholar
  2. 2.
    U.S. Department of Commerce/National Institute of Standards and Technology (NIST), Standards for Security Categorization of Federal Information and Information Systems (FIPS PUB 199) (2004) Google Scholar
  3. 3.
  4. 4.
    World Lottery Association, The World Lottery Association Values, http://www.world-lotteries.org/
  5. 5.
    The Internet Engineering Task Force (IETF), Internet Security Glossary, RFC 2828 (2000)Google Scholar
  6. 6.
    lottery, in Encyclopædia Britannica, Encyclopædia Britannica Online (2009), http://www.britannica.com/EBchecked/topic/348555/lottery
  7. 7.
    Zhou, J., Tan, C.: Playing Lottery on the Internet. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 189–201. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Liu, Y., et al.: A New Efficient E-Lottery Scheme Using Multi-Level Hash Chain. In: International Conference on Communication Technology, pp. 1–4 (2006)Google Scholar
  9. 9.
    Goldschlag, D.M., Stubblebine, S.G.: Publicly Verifiable Lotteries: Applications of Delaying Functions. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 214–226. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  10. 10.
    Sako, K.: Implementation of a Digital Lottery Server on WWW. In: Baumgart, R. (ed.) CQRE 1999. LNCS, vol. 1740, pp. 101–108. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  11. 11.
    The International Telecommunication Union (ITU), Data Communication Network: Open Systems Interconnection (OSI); Security, Structure and Applications (1991)Google Scholar
  12. 12.
    Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World, 2nd edn. Prentice Hall PTR, Upper Saddle River (2002)Google Scholar
  13. 13.
    Stallings, W.: Cryptography and Network Security, 4th edn. Prentice Hall, Upper Saddle River (2006)Google Scholar
  14. 14.
    Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC, New York (2007)Google Scholar
  15. 15.
    U.S. Department of Commerce/National Institute of Standards and Technology (NIST), Data Encryption Standard (DES) (FIPS PUB 46-3) (1999) Google Scholar
  16. 16.
    Hevia, A., Kiwi, M.: Strength of Two Data Encryption Standard Implementations under Timing Attacks. ACM Transactions on Information and System Security 2(4), 416–437 (1999)CrossRefGoogle Scholar
  17. 17.
    U.S. Department of Commerce/ National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES) (FIPS PUB 197) (2001) Google Scholar
  18. 18.
    RSA Cryptography Standard, PKCS #1 v2.1. (2002) Google Scholar
  19. 19.
    Chaum, D.: Blind Signatures for Untraceable Payments. In: Advances in Cryptology: Proceedings of Crypto, pp. 199–203 (1982)Google Scholar
  20. 20.
    Gao, J.Z., Prakash, L., Jagatesan, R.: Understanding 2D-Barcode Technology and Applications in M Commerce–Design and Implementation of a 2D Barcode Processing Solution. In: 31st Annual International Conference on Computer Software and Applications, vol. 2, pp. 49–56 (2007)Google Scholar
  21. 21.

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Pramote Kuacharoen
    • 1
  1. 1.Department of Computer Science, Graduate School of Applied StatisticsNational Institute of Development AdministrationBangkokThailand

Personalised recommendations