Abstract
We consider playing online games on peer-to-peer networks, without assuming servers that control the execution of a game. In such an environment, players may cheat the opponent by, for example, illegally replacing the cards in their hands. The aim of this paper is to examine a possibility of excluding such cheatings. We show that by employing cryptographic techniques, we can exclude some types of cheating at some level. Finally, based on our discussion, we implement the cheat-proof network “Gunjin-Shogi”, which is a variant of Japanese Chess.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Baughman, N.E., Levine, B.N.: Cheat-Proof Playout for Centralized and Distributed Online Games. In: Proc. of the 20th IEEE INFOCOM, pp. 104–113. IEEE Computer Society Press, Los Alamitos (2001)
Davis, S.B.: Why Cheating Matters: Cheating, Game Security, and the Future of Global On-line Gaming Business. In: Proc. of the Game Developer Conference 2001 (2001)
Franklin, M.K., Reiter, M.K.: The Design and Implementation of a Secure Auction Service. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 2–14. IEEE Computer Society Press, Los Alamitos (1995)
Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)
Goldreich, P., Micali, S., Wigderson, W.: How to Play Any Mental Game, or a Completeness Theorem for Protocols with Honest Majority. In: Proc. of the 19th ACM Symposium on the Theory of Computing, pp. 218–229. ACM Press, New York (1987)
Greenhill, R.: Diablo, and Online Multiplayer Game’s Future. Games Domain Review(1997), http://www.gamesdomain.com/gdreview/depart/jun97/diablo.html
Kirmse, A., Kirmse, C.: Security in Online Games. Game Developer 4(4), 20–28 (1997)
Shamir, A., Rivest, R.L., Adleman, L.M.: Mental Poker. In: Klarner, D.E. (ed.) Mathematical Gardner, pp. 37–41 (1981)
Smed, J., Kaukoranta, T., Hakonen, H.: Aspects of Networking in Multiplayer Computer Games. In: Proc. of the International Conference on Application and Development of Computer Games in the 21st Century, pp. 74–81 (2003)
Yan, J., Choi, H.J.: Security Issues in Online Games. The Electronic Library international journal for the application of technology in information environments 20(2), 125–133 (2002)
Yan, J.: Security Design in Online Games. In: ACSAC 2003, pp. 286–297. IEEE Computer Society, Los Alamitos (2003)
Yan, J., Randell, B.: A Systematic Classification of Cheating in Online Games. In: NetGames 2005. Proc. of the 4th Workshop on Network & System Support for Games, ACM Press, New York (2005)
Yao, A.C.: Protocols for Secure Computation. In: Proc. of the 23rd IEEE Symposium on the Foundation of Computer Science, pp. 160–164. IEEE Computer Society Press, Los Alamitos (1982)
Zhao, W., Varadharajan, V., Mu., Y.: A Secure Mental Poker Protocol Over The Internet. In: Proc. of the Australasian Information Security Workshop, pp. 105–109 (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kato, S., Miyazaki, S., Nishimura, Y., Okabe, Y. (2007). Cheat-Proof Serverless Network Games. In: van den Herik, H.J., Ciancarini, P., Donkers, H.H.L.M.(. (eds) Computers and Games. CG 2006. Lecture Notes in Computer Science, vol 4630. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75538-8_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-75538-8_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75537-1
Online ISBN: 978-3-540-75538-8
eBook Packages: Computer ScienceComputer Science (R0)