Design and Implementation of a Secure Online Lottery System
Government has the authority to operate lottery schemes. Since the operation of the lottery system is controlled by the government, there are issues with public trust. The people may speculate that the lottery is rigged. This issue becomes critical with an online lottery system since the unprotected data can be easy manipulated. If all combinations which have been sold are known before the drawing, the government may draw winning numbers which pay the least. Moreover, winning tickets may be added after the drawing. As a result, corruption may be inevitable. The government should operate lottery schemes with integrity which include transparency and accountability.
This paper presents the design and the implementation of a secure online lottery system. The proposed system can provide accuracy, privacy, transparency, and verifiability. Using the proposed system, the government can operate lottery schemes with integrity.
KeywordsOnline lottery system secure online lottery system information security
Unable to display preview. Download preview PDF.
- 1.Title 44 of the United States Code § 3542 (b) (1), United States Government Printing Office (2008) Google Scholar
- 2.U.S. Department of Commerce/National Institute of Standards and Technology (NIST), Standards for Security Categorization of Federal Information and Information Systems (FIPS PUB 199) (2004) Google Scholar
- 3.What is good governance? UNESCAP (2009), http://www.unescap.org/pdd/prs/ProjectActivities/Ongoing/gg/governance.asp
- 4.World Lottery Association, The World Lottery Association Values, http://www.world-lotteries.org/
- 5.The Internet Engineering Task Force (IETF), Internet Security Glossary, RFC 2828 (2000)Google Scholar
- 6.lottery, in Encyclopædia Britannica, Encyclopædia Britannica Online (2009), http://www.britannica.com/EBchecked/topic/348555/lottery
- 8.Liu, Y., et al.: A New Efficient E-Lottery Scheme Using Multi-Level Hash Chain. In: International Conference on Communication Technology, pp. 1–4 (2006)Google Scholar
- 11.The International Telecommunication Union (ITU), Data Communication Network: Open Systems Interconnection (OSI); Security, Structure and Applications (1991)Google Scholar
- 12.Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World, 2nd edn. Prentice Hall PTR, Upper Saddle River (2002)Google Scholar
- 13.Stallings, W.: Cryptography and Network Security, 4th edn. Prentice Hall, Upper Saddle River (2006)Google Scholar
- 14.Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC, New York (2007)Google Scholar
- 15.U.S. Department of Commerce/National Institute of Standards and Technology (NIST), Data Encryption Standard (DES) (FIPS PUB 46-3) (1999) Google Scholar
- 17.U.S. Department of Commerce/ National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES) (FIPS PUB 197) (2001) Google Scholar
- 18.RSA Cryptography Standard, PKCS #1 v2.1. (2002) Google Scholar
- 19.Chaum, D.: Blind Signatures for Untraceable Payments. In: Advances in Cryptology: Proceedings of Crypto, pp. 199–203 (1982)Google Scholar
- 20.Gao, J.Z., Prakash, L., Jagatesan, R.: Understanding 2D-Barcode Technology and Applications in M Commerce–Design and Implementation of a 2D Barcode Processing Solution. In: 31st Annual International Conference on Computer Software and Applications, vol. 2, pp. 49–56 (2007)Google Scholar
- 21.QR Code, http://www.denso-wave.com/qrcode/