Abstract
A solution for obtaining impartial random values in on-line gambling is presented in this paper. Unlike most previous proposals, our method does not require any TTP and allows e-gambling to reach standards of fairness, security an auditability similar to those common in physical gambling.
Although our solution is detailed here for the particular case of games with reversed cards (e.g. poker), it can be easily adapted for games with open cards (e.g. blackjack) and for random draw games (e.g. keno). Thanks to the use of permutations of homomorphically encrypted cards, the protocols described have moderate computational requirements.
Keywords
Categories
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Barany, I., Furedi, Z.: Mental poker with three or more players, Technical report, Mathematical Institute of the Hungarian Academy of Sciences (1983)
Blum, M.: Coin flipping by telephone: A protocol for solving impossible problems. In: Proceedings of the 24th IEEE Computer Conference (CompCon.), pp. 175–193 (1982)
Castellà-Roca, J., Riera-Jorba, A., Borrell-Viader, J., Domingo-Ferrer, J.: A method for obtaining an impartial result in a game over a communications network and related protocols and programs. international patent PCT ES02/00485, October 14 (2002)
Chou, J.S., Yeh, Y.S.: Mental poker game based on a bit commitment scheme through network. Computer Networks 38, 247–255 (2002)
Coppersmith, D.: Cheating at mental poker. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 104–107. Springer, Heidelberg (1986)
Crépeau, C.: A secure poker protocol that minimizes the effect of player coalitions. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 73–86. Springer, Heidelberg (1986)
Crépeau, C.: A zero-knowledge poker protocol that achieves confidentiality of the players’ strategy or how to achieve an electronic poker face. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 239–250. Springer, Heidelberg (1987)
DeMillo, R., Merritt, M.: Protocols for data security. Computer 16, 39–50 (1983)
Domingo-Ferrer, J.: A new privacy homomorphism and applications. Information Processing Letters 60, 277–282 (1996)
Domingo-Ferrer, J.: A provably secure additive and multiplicative privacy homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 471–483. Springer, Heidelberg (2002)
Edwards, J.: Implementing Electronic Poker: A Practical Exercise in Zero-Knowledge Interactive Proofs. Master’s thesis, Department of Computer Science, University of Kentucky (1994)
Fortune, S., Merritt, M.: Poker protocols. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 454–466. Springer, Heidelberg (1985)
Gambling Review Body, Department for Culture Media and Sport of Great Britain, ch. 13, p. 167 (July 17, 2001), http://www.culture.gov.uk/role/gamblingreview.html
Goldwasser, S., Micali, S.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: Proceedings of the 18th ACM Symposium on the Theory of Computing, pp. 270–299 (1982)
Hall, C., Schneier, B.: Remote electronic gambling. In: 13th ACM Annual Computer Security Applications Conference, pp. 227–230 (1997)
Harn, L., Lin, H.Y., Gong, G.: Bounded-to-unbounded poker game. Electronics Letters 36, 214–215 (2000)
Jakobsson, M., Pointcheval, D., Young, A.: Secure mobile gambling. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 100–109. Springer, Heidelberg (2001)
Kurosawa, K., Katayama, Y., Ogata, W., Tsujii, S.: General public key residue cryptosystems and mental poker protocols. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 374–388. Springer, Heidelberg (1991)
Kurosawa, K., Katayama, Y., Ogata, W.: Reshufflable and laziness tolerant mental card game protocol. TIEICE: IEICE Transactions on Communications/Electronics/Information and Systems E00-A (1997)
Lamport, L.: Password authentication with insecure communicaions. Communications of the ACM 24, 770–771 (1981)
Lipton, R.: How to cheat at mental poker. In: Proc. AMS Short Course on crytography (1981)
Oppliger, R., Nottaris, J.: Online casinos. In: Kommunikation in verteilten Systemen, pp. 2–16 (1997)
Kushilevitz, E., Rabin, T.: Fair e-lotteries and e-casinos. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 110–119. Springer, Heidelberg (2001)
Shamir, A., Rivest, R., Adleman, L.: Mental poker. In: Mathematical Gardner, pp. 37–43 (1981)
Schindelhauer, C.: A toolbox for mental card games, Medizinische Universität Lübeck (1998), http://citeseer.nj.nec.com/schindelhauer98toolbox.html
Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edn. Wiley, New York (1996)
Yung, M.: Cryptoprotocols: Subscription to a public key, the secret blocking and the multi-player mental poker game. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 439–453. Springer, Heidelberg (1985)
Zhao, W., Varadharajan, V., Mu, Y.: Fair on-line gambling. In: 16th IEEE Annual Computer Security Applications Conference (ACSAC 2000), New Orleans, Louisiana, pp. 394–400 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Castellà-Roca, J., Domingo-Ferrer, J., Riera, A., Borrell, J. (2003). Practical Mental Poker Without a TTP Based on Homomorphic Encryption. In: Johansson, T., Maitra, S. (eds) Progress in Cryptology - INDOCRYPT 2003. INDOCRYPT 2003. Lecture Notes in Computer Science, vol 2904. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24582-7_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-24582-7_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20609-5
Online ISBN: 978-3-540-24582-7
eBook Packages: Springer Book Archive