Secure and Verifiable P2P Card Games

被引:1
|
作者
Yeh, Chun-Chao [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci, Chilung, Taiwan
关键词
P2P card game; secure; verifiable; TTP-free;
D O I
10.1109/EUC.2008.165
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents the design of secure and verifiable P2P card games. An efficient scheme was proposed to achieve secret encoding, distribution, revealing, and verification. in a fully distributed way. The proposed card shuffling scheme is based on lightweight operations such as permutation and modular addition. Compared with most of previous approaches basing on public key cryptosystems and their alike, the proposed scheme is simple and fast. This unique feature makes the proposed scheme more feasible for those resource limited mobile devices, such as PDAs and smartphones.
引用
收藏
页码:344 / 349
页数:6
相关论文
共 50 条
  • [21] A Framework for Secure and Private P2P Publish/Subscribe
    Bernard, Samuel
    Potop-Butucaru, Maria Gradinariu
    Tixeuil, Sebastien
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, 2010, 6366 : 531 - 545
  • [22] Secure P2P programming on top of tuple spaces
    Benigni, F.
    Brogi, A.
    Buchholz, J. L.
    Jacquet, J. M.
    Lange, J.
    Popescu, R.
    17TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURES FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2008, : 54 - +
  • [23] \ Distributed and Secure Access Control in P2P Databases
    Bonifati, Angela
    Liu, Ruilin
    Wang, Hui
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 113 - +
  • [24] Trust management without reputation in P2P games
    Wierzbicki, Adam
    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography, 2006, : 126 - 134
  • [25] EVOLUTIONARY GAMES FOR COOPERATIVE P2P VIDEO STREAMING
    Chen, Yan
    Wang, Beibei
    Lin, W. Sabrina
    Wu, Yongle
    Liu, K. J. Ray
    2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, : 4453 - 4456
  • [26] A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges
    Wang, Jian
    Hu, Xiaoming
    Xu, Xiaolin
    Yang, Yinchun
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (01) : 103 - 110
  • [27] A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges
    Jian Wang
    Xiaoming Hu
    Xiaolin Xu
    Yinchun Yang
    Peer-to-Peer Networking and Applications, 2015, 8 : 103 - 110
  • [28] 2 P2P or not 2 P2P?
    Roussopoulos, M
    Baker, M
    Rosenthal, DSH
    Giuli, TJ
    Maniatis, P
    Mogul, J
    PEER-TO-PEER SYSTEMS III, 2004, 3279 : 33 - 43
  • [29] Secure Mobile Agent for Telemedicine Based on P2P Networks
    Hsu, Wen-Shin
    Pan, Jiann-I
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (03)
  • [30] Secure content access and replication in pure P2P networks
    Palomar, Esther
    Tapiador, Juan M. E.
    Hernandez-Castro, Julio C.
    Ribagorda, Arturo
    COMPUTER COMMUNICATIONS, 2008, 31 (02) : 266 - 279