4,333 research outputs found
A secure additive protocol for card players
Consider three players Alice, Bob and Cath who hold a, b and c cards,
respectively, from a deck of d=a+b+c cards. The cards are all different and
players only know their own cards. Suppose Alice and Bob wish to communicate
their cards to each other without Cath learning whether Alice or Bob holds a
specific card.
Considering the cards as consecutive natural numbers 0,1,..., we investigate
general conditions for when Alice or Bob can safely announce the sum of the
cards they hold modulo an appropriately chosen integer. We demonstrate that
this holds whenever a,b>2 and c=1. Because Cath holds a single card, this also
implies that Alice and Bob will learn the card deal from the other player's
announcement
A secure additive protocol for card players
Abstract Consider three players Alice, Bob and Cath who hold a, b and c cards, respectively, from a deck of d = a + b + c cards. The cards are all different and players only know their own cards. Suppose Alice and Bob wish to communicate their cards to each other without Cath learning whether Alice or Bob holds a specific card. Considering the cards as consecutive natural numbers 0, 1, . . . , we investigate general conditions for when Alice or Bob can safely announce the sum of the cards they hold modulo an appropriately chosen integer. We demonstrate that this holds whenever a, b > 2 and c = 1. Because Cath holds a single card, this also implies that Alice and Bob will learn the card deal from the other player's announcement
A geometric protocol for cryptography with cards
In the generalized Russian cards problem, the three players Alice, Bob and
Cath draw a,b and c cards, respectively, from a deck of a+b+c cards. Players
only know their own cards and what the deck of cards is. Alice and Bob are then
required to communicate their hand of cards to each other by way of public
messages. The communication is said to be safe if Cath does not learn the
ownership of any specific card; in this paper we consider a strengthened notion
of safety introduced by Swanson and Stinson which we call k-safety.
An elegant solution by Atkinson views the cards as points in a finite
projective plane. We propose a general solution in the spirit of Atkinson's,
although based on finite vector spaces rather than projective planes, and call
it the `geometric protocol'. Given arbitrary c,k>0, this protocol gives an
informative and k-safe solution to the generalized Russian cards problem for
infinitely many values of (a,b,c) with b=O(ac). This improves on the collection
of parameters for which solutions are known. In particular, it is the first
solution which guarantees -safety when Cath has more than one card
Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem
We present the first formal mathematical presentation of the generalized
Russian cards problem, and provide rigorous security definitions that capture
both basic and extended versions of weak and perfect security notions. In the
generalized Russian cards problem, three players, Alice, Bob, and Cathy, are
dealt a deck of cards, each given , , and cards, respectively.
The goal is for Alice and Bob to learn each other's hands via public
communication, without Cathy learning the fate of any particular card. The
basic idea is that Alice announces a set of possible hands she might hold, and
Bob, using knowledge of his own hand, should be able to learn Alice's cards
from this announcement, but Cathy should not. Using a combinatorial approach,
we are able to give a nice characterization of informative strategies (i.e.,
strategies allowing Bob to learn Alice's hand), having optimal communication
complexity, namely the set of possible hands Alice announces must be equivalent
to a large set of -designs, where . We also provide some
interesting necessary conditions for certain types of deals to be
simultaneously informative and secure. That is, for deals satisfying
for some , where and the strategy is assumed to satisfy
a strong version of security (namely perfect -security), we show that and hence . We also give a precise characterization of informative
and perfectly -secure deals of the form satisfying involving -designs
The Elgamal Cryptosystem is better than Th RSA Cryptosystem for Mental Poker
Cryptosystems are one of the most important parts of secure online poker card games. However, there is no research comparing the RSA Cryptosystem (RC) and Elgamal Cryptosystem (EC) for mental poker card games. This paper compares the RSA Cryptosystem and Elgamal Cryptosystem implementations of mental poker card games using distributed key generation schemes. Each implementation is based on a joint encryption/decryption of individual cards. Both implementations use shared private key encryption/decryption schemes and neither uses a trusted third party (TTP). The comparison criteria will be concentrated on the security and computational complexity of the game, collusions among the players and the debate between the discrete logarithm problem (DLP) and the factoring problem (FP) for the encryption/decryption schemes. Under these criteria, the comparison results demonstrate that the Elgamal Cryptosystem has better efficiency and effectiveness than RSA for mental poker card games
Banking the unbanked using prepaid platforms and mobile telephones in the United States
The rapid growth of mobile phone usage and the continuous rise in wireless coverage fuel the expectations that access to financial services trough mobile phones could transform the way financial services are provided. The emergence of new and more efficient business models, can potentially resolve supply inefficiencies that explain the large unbanked population that exists in the USA, much larger than in most developed countries. Nearly 40 million US households (approximately 73 million people) are financially underserved (CFSI, 2007), of which 15 million households (approximately 28 million people) are totally unbanked. This problem is explained by the non adequacy of the value proposals offered by financial institutions to the demands of the US customers. The areas of poor alignment refer mostly to the design of products and the marketing and distribution networks used. To resolve these misalignments, this paper will argue that business models based on prepaid cards as products and mobile phones as transactional and distribution channels could be used in order to close the supply gap. We will call the business model proposed based on prepaid products and mobile phones mobile banking, since these two elements are the basis of the business model used companies such as Smart Money and G-Cash in the Phillipines, Wizzit in South Africa and M-Pesa in Kenya.prepaid platform; unbanked; financial services; mobile phones; prepaid cards;
ARPA Whitepaper
We propose a secure computation solution for blockchain networks. The
correctness of computation is verifiable even under malicious majority
condition using information-theoretic Message Authentication Code (MAC), and
the privacy is preserved using Secret-Sharing. With state-of-the-art multiparty
computation protocol and a layer2 solution, our privacy-preserving computation
guarantees data security on blockchain, cryptographically, while reducing the
heavy-lifting computation job to a few nodes. This breakthrough has several
implications on the future of decentralized networks. First, secure computation
can be used to support Private Smart Contracts, where consensus is reached
without exposing the information in the public contract. Second, it enables
data to be shared and used in trustless network, without disclosing the raw
data during data-at-use, where data ownership and data usage is safely
separated. Last but not least, computation and verification processes are
separated, which can be perceived as computational sharding, this effectively
makes the transaction processing speed linear to the number of participating
nodes. Our objective is to deploy our secure computation network as an layer2
solution to any blockchain system. Smart Contracts\cite{smartcontract} will be
used as bridge to link the blockchain and computation networks. Additionally,
they will be used as verifier to ensure that outsourced computation is
completed correctly. In order to achieve this, we first develop a general MPC
network with advanced features, such as: 1) Secure Computation, 2) Off-chain
Computation, 3) Verifiable Computation, and 4)Support dApps' needs like
privacy-preserving data exchange
Combining behavioural types with security analysis
Today's software systems are highly distributed and interconnected, and they
increasingly rely on communication to achieve their goals; due to their
societal importance, security and trustworthiness are crucial aspects for the
correctness of these systems. Behavioural types, which extend data types by
describing also the structured behaviour of programs, are a widely studied
approach to the enforcement of correctness properties in communicating systems.
This paper offers a unified overview of proposals based on behavioural types
which are aimed at the analysis of security properties
Instantaneous Decentralized Poker
We present efficient protocols for amortized secure multiparty computation
with penalties and secure cash distribution, of which poker is a prime example.
Our protocols have an initial phase where the parties interact with a
cryptocurrency network, that then enables them to interact only among
themselves over the course of playing many poker games in which money changes
hands.
The high efficiency of our protocols is achieved by harnessing the power of
stateful contracts. Compared to the limited expressive power of Bitcoin
scripts, stateful contracts enable richer forms of interaction between standard
secure computation and a cryptocurrency.
We formalize the stateful contract model and the security notions that our
protocols accomplish, and provide proofs using the simulation paradigm.
Moreover, we provide a reference implementation in Ethereum/Solidity for the
stateful contracts that our protocols are based on.
We also adopt our off-chain cash distribution protocols to the special case
of stateful duplex micropayment channels, which are of independent interest. In
comparison to Bitcoin based payment channels, our duplex channel implementation
is more efficient and has additional features
- …