ÀÎÅͳݰ׺í | Cases & Studies in Internet Gambling | 网ß¾赌ÚÏ
- Article] Non-iterative privacy preservation for online lotteries
-
DocNo of ILP: 2978
Doc. Type: Article
Title: Non-iterative privacy preservation for online lotteries
Authors: Lee, JS; Chan, CS; Chang, CC
Full Name of Authors: Lee, J. -S.; Chan, C. -S.; Chang, C. -C.
Keywords by Author:
Keywords Plus: SCHEME
Abstract: Unlike gambling, lottery games can exist in a lawful form to raise funds for charitable institutions. Owing to the expeditious development of network technology, lotteries over the Internet have become an inevitable trend. Since the Internet allows people to communicate with each other without direct contact, it is more difficult to guarantee the security and fairness of online lotteries than for conventional lottery games. However, electronic lottery methods can also provide something that conventional lottery mechanisms cannot: they allow players to purchase tickets at any time and in any place where they can access the Internet. The authors propose an online lottery mechanism that can confirm the propositions of general lottery games. Specifically, this novel method not only allows players to make t-out-of-n numbers in lotteries without iterative selection but also preserves the privacy of players' choices, making the system more similar to traditional lottery games.
Cate of OECD: Computer and information sciences
Year of Publication: 2009
Business Area: lottery
Detail Business: lottery
Country: England
Study Area: promotion, fund, network & communication, internet, player
Name of Journal: IET INFORMATION SECURITY
Language: English
Country of Authors: [Lee, J. -S.; Chang, C. -C.] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan; [Chan, C. -S.] Asia Univ, Dept Informat Sci & Applicat, Taichung 41354, Taiwan; [Chang, C. -C.] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
Press Adress: Lee, JS (reprint author), Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan.
Email Address: ljs@cs.ccu.edu.tw
Citaion:
Funding:
Lists of Citation: Chang CC, 2003, COMPUT SECUR, V22, P160, DOI 10.1016/S0167-4048(03)00214-1; Chow SSM, 2006, COMPUT COMMUN, V29, P2830, DOI 10.1016/j.comcom.2005.10.034; ELGAMAL T, 1985, IEEE T INFORM THEORY, V31, P469, DOI 10.1109/TIT.1985.1057074; Goldschlag D.M., 1998, P 2 INT C FIN CRYPT, P214; GRAMER R, 1999, P 6 ACM C COMP COMM, P46; HWANG HF, 2006, P 2006 IEEE INT C E, P39; KUSHILEVITZ E, 2001, P CRYPT TRACK RSA C, P100; Lee JS, 2009, COMPUT STAND INTER, V31, P395, DOI 10.1016/j.csi.2008.05.004; RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/359340.359342; Sako K., 1999, P INT EXH C SEC NETW, P101; Zhou J., 2001, P 3 INT C INF COMM S, P189
Number of Citaion: 11
Publication: INST ENGINEERING TECHNOLOGY-IET
City of Publication: HERTFORD
Address of Publication: MICHAEL FARADAY HOUSE SIX HILLS WAY STEVENAGE, HERTFORD SG1 2AY, ENGLAND
ISSN: 1751-8709
29-Character Source Abbreviation: IET INFORM SECUR
ISO Source Abbreviation: IET Inf. Secur.
Volume: 3
Version: 4
Start of File: 139
End of File: 147
DOI: 10.1049/iet-ifs.2008.0104
Number of Pages: 9
Web of Science Category: Computer Science, Information Systems; Computer Science, Theory & Methods
Subject Category: Computer Science
Document Delivery Number: 534KO
Unique Article Identifier: WOS:000272895500002
[ÀÌ °Ô½Ã¹°Àº HyeJung Mo¡¦´Ô¿¡ ÀÇÇØ 2015-05-20 14:44:04 GAMBLING¿¡¼ À̵¿ µÊ]
- reply : 0
-
- list
-
- prev
- next