Skip to main content

Practical Mental Poker Without a TTP Based on Homomorphic Encryption

  • Conference paper
Progress in Cryptology - INDOCRYPT 2003 (INDOCRYPT 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2904))

Included in the following conference series:

Abstract

A solution for obtaining impartial random values in on-line gambling is presented in this paper. Unlike most previous proposals, our method does not require any TTP and allows e-gambling to reach standards of fairness, security an auditability similar to those common in physical gambling.

Although our solution is detailed here for the particular case of games with reversed cards (e.g. poker), it can be easily adapted for games with open cards (e.g. blackjack) and for random draw games (e.g. keno). Thanks to the use of permutations of homomorphically encrypted cards, the protocols described have moderate computational requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barany, I., Furedi, Z.: Mental poker with three or more players, Technical report, Mathematical Institute of the Hungarian Academy of Sciences (1983)

    Google Scholar 

  2. Blum, M.: Coin flipping by telephone: A protocol for solving impossible problems. In: Proceedings of the 24th IEEE Computer Conference (CompCon.), pp. 175–193 (1982)

    Google Scholar 

  3. Castellà-Roca, J., Riera-Jorba, A., Borrell-Viader, J., Domingo-Ferrer, J.: A method for obtaining an impartial result in a game over a communications network and related protocols and programs. international patent PCT ES02/00485, October 14 (2002)

    Google Scholar 

  4. Chou, J.S., Yeh, Y.S.: Mental poker game based on a bit commitment scheme through network. Computer Networks 38, 247–255 (2002)

    Article  Google Scholar 

  5. Coppersmith, D.: Cheating at mental poker. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 104–107. Springer, Heidelberg (1986)

    Google Scholar 

  6. Crépeau, C.: A secure poker protocol that minimizes the effect of player coalitions. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 73–86. Springer, Heidelberg (1986)

    Google Scholar 

  7. Crépeau, C.: A zero-knowledge poker protocol that achieves confidentiality of the players’ strategy or how to achieve an electronic poker face. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 239–250. Springer, Heidelberg (1987)

    Google Scholar 

  8. DeMillo, R., Merritt, M.: Protocols for data security. Computer 16, 39–50 (1983)

    Article  Google Scholar 

  9. Domingo-Ferrer, J.: A new privacy homomorphism and applications. Information Processing Letters 60, 277–282 (1996)

    Article  MathSciNet  Google Scholar 

  10. Domingo-Ferrer, J.: A provably secure additive and multiplicative privacy homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 471–483. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  11. Edwards, J.: Implementing Electronic Poker: A Practical Exercise in Zero-Knowledge Interactive Proofs. Master’s thesis, Department of Computer Science, University of Kentucky (1994)

    Google Scholar 

  12. Fortune, S., Merritt, M.: Poker protocols. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 454–466. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  13. Gambling Review Body, Department for Culture Media and Sport of Great Britain, ch. 13, p. 167 (July 17, 2001), http://www.culture.gov.uk/role/gamblingreview.html

  14. Goldwasser, S., Micali, S.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: Proceedings of the 18th ACM Symposium on the Theory of Computing, pp. 270–299 (1982)

    Google Scholar 

  15. Hall, C., Schneier, B.: Remote electronic gambling. In: 13th ACM Annual Computer Security Applications Conference, pp. 227–230 (1997)

    Google Scholar 

  16. Harn, L., Lin, H.Y., Gong, G.: Bounded-to-unbounded poker game. Electronics Letters 36, 214–215 (2000)

    Article  Google Scholar 

  17. Jakobsson, M., Pointcheval, D., Young, A.: Secure mobile gambling. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 100–109. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  18. Kurosawa, K., Katayama, Y., Ogata, W., Tsujii, S.: General public key residue cryptosystems and mental poker protocols. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 374–388. Springer, Heidelberg (1991)

    Google Scholar 

  19. Kurosawa, K., Katayama, Y., Ogata, W.: Reshufflable and laziness tolerant mental card game protocol. TIEICE: IEICE Transactions on Communications/Electronics/Information and Systems E00-A (1997)

    Google Scholar 

  20. Lamport, L.: Password authentication with insecure communicaions. Communications of the ACM 24, 770–771 (1981)

    Article  Google Scholar 

  21. Lipton, R.: How to cheat at mental poker. In: Proc. AMS Short Course on crytography (1981)

    Google Scholar 

  22. Oppliger, R., Nottaris, J.: Online casinos. In: Kommunikation in verteilten Systemen, pp. 2–16 (1997)

    Google Scholar 

  23. Kushilevitz, E., Rabin, T.: Fair e-lotteries and e-casinos. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 110–119. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  24. Shamir, A., Rivest, R., Adleman, L.: Mental poker. In: Mathematical Gardner, pp. 37–43 (1981)

    Google Scholar 

  25. Schindelhauer, C.: A toolbox for mental card games, Medizinische Universität Lübeck (1998), http://citeseer.nj.nec.com/schindelhauer98toolbox.html

  26. Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edn. Wiley, New York (1996)

    MATH  Google Scholar 

  27. Yung, M.: Cryptoprotocols: Subscription to a public key, the secret blocking and the multi-player mental poker game. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 439–453. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  28. Zhao, W., Varadharajan, V., Mu, Y.: Fair on-line gambling. In: 16th IEEE Annual Computer Security Applications Conference (ACSAC 2000), New Orleans, Louisiana, pp. 394–400 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Castellà-Roca, J., Domingo-Ferrer, J., Riera, A., Borrell, J. (2003). Practical Mental Poker Without a TTP Based on Homomorphic Encryption. In: Johansson, T., Maitra, S. (eds) Progress in Cryptology - INDOCRYPT 2003. INDOCRYPT 2003. Lecture Notes in Computer Science, vol 2904. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24582-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24582-7_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20609-5

  • Online ISBN: 978-3-540-24582-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics