Mental Poker for Turn-Based Strategy Games – Securing Fairness Without a Trusted Third Party

Total Page:16

File Type:pdf, Size:1020Kb

Mental Poker for Turn-Based Strategy Games – Securing Fairness Without a Trusted Third Party Mental poker for turn-based strategy games – securing fairness without a trusted third party Stian Aleksander Ellingsen 15-12-2016 Master’s Thesis Master of Science in Applied Computer Science 30 ECTS Department of Computer Science and Media Technology Norwegian University of Science and Technology, Supervisor: Mariusz Nowostawski Abstract Strategy video games typically provide players with only partial information about the game world, hiding everything outside the range of vision of each player’s units. A third party is typically trusted with running the game and lim- iting the information given to players. A player colluding with the third party could gain a huge unfair advantage by accessing more information than allowed by the rules, and such cheating is generally undetectable. Between players who don’t trust a common third party, a different solution is needed. The same problem arises for card games when implemented over a computer network in a provably fair way without a trusted third party. In card games, this problem is known as mental poker, and a solution to this problem was first suggested in 1981. While turn-based strategy games and card games have some important elements in common, the methods provided in mental poker solutions do not translate directly to turn-based strategy games. Some work has been done on hiding player units in strategy games without a trusted third party, but not completely without unwanted information exposure. There is also previous work on securely generating maps for strategy games with- out a third party, but not in a way that hides unexplored terrain. This project applies the problem of mental poker to provide a protocol for playing a turn-based strategy game over a network, with computational require- ments that can be met by a normal computer. This includes securely generating random maps, hiding unexplored terrain and units with negligible information exposure during gameplay, while dissuading attempts at cheating or disruption. Mental poker for turn-based strategy games – securing fairness without a trusted third party Contents Contents .................................... i 1 Introduction ................................ 1 1.1 Problem description . .1 1.2 Threat model and principles . .2 2 Related work ................................ 3 2.1 Fair play . .3 2.2 Obtaining randomness . .4 2.3 Map generation . .5 2.4 Consequences of the game outcome . .5 3 Protocol ................................... 7 3.1 Game initialisation . .7 3.1.1 Game parametres . .7 3.1.2 Private keys . .8 3.1.3 Contract . .8 3.1.4 Modulus . .9 3.1.5 The game state . 10 3.1.6 Initialisation of the game state . 10 3.2 Privately retrieving randomness . 10 3.3 Updating and retrieving encrypted game state . 11 3.4 Verification . 11 3.5 Ending the game . 11 3.6 Cipher . 12 4 Map generation .............................. 14 4.1 Algorithms . 15 5 Security parametres ............................ 19 6 Performance analysis ........................... 20 6.1 Blockchain scripts . 21 7 Enforcing fair play ............................ 23 8 Conclusion and future work ....................... 25 A Blockchain details ............................. 27 A.1 Features . 27 A.2 Objects . 27 i Mental poker for turn-based strategy games – securing fairness without a trusted third party A.2.1 State . 27 A.3 Branches . 28 A.3.1 REVEALp ............................ 28 A.3.2 GENERIC ............................ 28 A.3.3 TIMEOUTp ........................... 28 A.3.4 CHEATi;j;p;q ........................... 28 A.4 Programs . 29 A.4.1 progMain . 29 A.4.2 progRevealp;q ......................... 29 A.4.3 progWithStatei;p;q ....................... 29 A.5 Transactions . 29 A.5.1 txFunding . 29 A.5.2 txResignp;q .......................... 30 A.5.3 txRevealp;q .......................... 30 A.5.4 txWithStatei;p;q ........................ 30 A.5.5 txDefaultp;q .......................... 30 B Source code ................................ 32 B.1 Blockchain.hs . 32 B.2 Compile.hs . 42 B.3 Game.hs . 54 Glossary .................................... 59 Bibliography .................................. 62 ii Mental poker for turn-based strategy games – securing fairness without a trusted third party Chapter 1 Introduction The project deals with the problem of playing a turn-based strategy (TBS) game between two or more players over a network, in such a way that each player is able to ensure that the game is fair, without players having to trust each other or a common third party. This problem is greatly complicated when each player should be restricted to seeing only the parts of the game world that their own units can see, a typical feature in strategy games. 1.1 Problem description In strategy video games, players typically control a set of units placed in a game world shared with opponents. Depending on their type, units can be commanded to explore the world, to collect resources found in the world, or to combat against opponent units. Two main sub-genres are real-time strategy (RTS) games and TBS games, which mainly differ in the way timekeeping works. In RTS, time is continuous, while in TBS, players’ actions are grouped in turns. An important feature in many strategy video games is the effect referred to as fog of war: A player can only see the part of the game world that is within their unit’s line of sight [1]. However, the whole game state is usually available to the computer which is running the game logic, and may easily be accessed by the owner, which could be one (or all) of the players, or a third party which could be colluding with one of the players. This type of cheating may give a player a huge advantage over honest players and can’t be detected directly, if at all. Mental poker, introduced by Shamir, Rivest and Adleman [20], involves play- ing a game of cards at a distance, using only messages between the players. To ensure a fair method of playing mental poker, important properties of a physical equivalent of the game are preserved, such as ensuring a fair deal, being able to hide one’s own hand from other players, and making sure that two players can’t have the same card. This is made possible with the use of cryptography. For example, securely shuffling the deck can be done by having each player encrypt 1 Mental poker for turn-based strategy games – securing fairness without a trusted third party each card in the deck, shuffle the deck and then pass it to the next player. While mental poker is mostly concerned with card games [21], the same prob- lem can be applied to other types of games as well. The element of incomplete information is similar to fog of war in strategy games, and TBS games in partic- ular are played in turns like card games. Applying the problem of mental poker to TBS games prompts the need for a protocol for playing a TBS game over a network, fairly, and with negligible information exposure, enforcing fog of war on units as well as the rest of the game world. This project seeks to provide a practical solution to this, including methods to sufficiently dissuade attempts at cheating or disruption. 1.2 Threat model and principles Two players want to play a TBS game against each other over the Internet. They do not trust each other to play fairly, nor do they have a trusted third party (TTP) in common to run the game and decide on the outcome. Each player is assumed to play the game on a computer system that they fully control and trust. For the purpose of this project, cheating involves retrieving information that should not be accessible to the player or modifying the game state in a way that is not allowed by the game rules. Other actions that may be considered cheating, such as disrupting the network connection of the other player or using additional computer software to aid in or automate selection of game actions, are not considered in this project. 2 Mental poker for turn-based strategy games – securing fairness without a trusted third party Chapter 2 Related work 2.1 Fair play This thesis applies the problem of mental poker to turn-based strategy (TBS) games. There has been a lot of research on mental poker, but this has mostly focused on card games [21]. It is not obvious how to apply methods of shuffling and dealing cards to a TBS game. Nonetheless, the cryptographic primitives used for these games could be useful. The mental poker protocol given by Shamir, Rivest and Adleman [20] relies on a commutative encryption scheme, meaning that the order of encryption doesn’t matter when a message is doubly encrypted with different keys – a description of such a scheme is given by Pohlig and Hellman [18]. In a game between Alice and Bob, Bob starts by encrypting and shuffling the cards, sending the deck to Alice. To obtain her hand, Alice takes a random set of cards, encrypts them and gets Bob to decrypt them. Alice then decrypts these. This way, Alice can’t control which cards she obtains, and Bob can’t know Alice’s hand. Goldreich, Micali and Wigderson [13] give a general solution for playing any mental game as long as the majority of the participants are honest. This is done by building circuits of logic gates to implement the whole game. The purpose of their paper is to prove that such a model exists, and efficiency is not a concern. However, for something as complex as a full TBS game, performance will quickly become an issue. Chambers et al. [9] give a method for detecting when a player has bypassed the fog of war to reveal opponents’ units and positions. The method works by exchanging bitmaps of the visible areas between players, and only sending infor- mation about the units that should be seen by each opponent.
Recommended publications
  • A Fast Mental Poker Protocol
    J. Math. Cryptol. 6 (2012), 39–68 DOI 10.1515/jmc-2012-0004 © de Gruyter 2012 A fast mental poker protocol Tzer-jen Wei and Lih-Chung Wang Communicated by Kwangjo Kim Abstract. In this paper, we present a fast and secure mental poker protocol. The basic structure is the same as Barnett & Smart’s and Castellà-Roca’s protocols but our encryp- tion scheme is different. With this alternative encryption scheme, our shuffle is not only twice as fast, but it also has different security properties. As such, Barnett & Smart’s and Castellà-Roca’s security proof cannot be applied to our protocol directly. Nevertheless, our protocol is still provably secure under the DDH assumption. The only weak point of our protocol is that reshuffling a small subset of cards might take longer than Barnett & Smart’s and Castellà-Roca’s protocols. Therefore, our protocol is more suitable for card games such as bridge, most poker games, mahjong, hearts, or black jack, which do not require much partial reshuffling. Keywords. Mental poker, DDH assumption. 2010 Mathematics Subject Classification. 94A60, 68M12. 1 Introduction 1.1 Mental poker Mental poker is the study of protocols that allow players to play fair poker games over the net without a trusted third party. There are very few assumptions about the behavior of adversaries in mental poker. Adversaries are typically allowed to have a coalition of any size and can conduct active attacks. The main challenge is to design a secure mental poker protocol that is fast enough for practical needs. Numerous mental poker protocols have been proposed ([4,5,10–12,17,18,20,25,26,28,30,34–36]) and many of them are provably secure, but all commercial online poker rooms are still based on client-server architec- tures.
    [Show full text]
  • Protocols for Secure Computations (Extended Abstract)
    Protocols for Secure Computations (extended abstract) Andrew C. Yao University of California Berkeley, California 94720 1 Introduction without a precise model it would be hard to answer a Two millionaires wish to know who is richer; however, question such as “Is it possible for three mutually sus- they do not want to find out inadvertently any additional pecting parties to interactively generate a bit with bias information about each other’s wealth. How can they 1/e ?” carry out such a conversation? In response to this need, we propose to adopt the fol- This is a special case of the following general prob- lowing view. Two parties Alice and Bob, in possession lem. Suppose m people wish to compute the value of a of private variables i and j respectively, wish to commu- nicate so that Alice can evaluate a function f(i, j), and function f(x1, x2, x3, . , xm), which is an integer-valued Bob a function g(i, j). There may be some eavesdrop- function of m integer variables xi of bounded range. As- pers or saboteurs on the communication line. The pur- sume initially person Pi knows the value of xi and no other x’s. Is it possible for them to compute the value of pose of a protocol would be to design an algorithm for f, by communicating among themselves, without unduly Alice and Bob to follow, such that certain security con- giving away any information about the values of their own straints (against saboteur) and privacy constraints (Alice variables? The millionaires’ problem corresponds to the may not wish to reveal the exact value of i) can be satis- fied.
    [Show full text]
  • Contributions to Mental Poker
    Contributions to Mental Poker Submitted to Universitat Autonoma` de Barcelona in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science by Jordi Castell`a-Roca May 2005 c Copyright 2005 by Jordi Castell`a-Roca Abstract Computer networks and especially the Internet have allowed some common activities such as shopping or gambling to become remote (e-shopping and e-gambling). The poker game played over a network is known as mental poker. The problem with mental poker is the difficulty of keeping it practical while guaranteeing the same standards of security, fairness and auditability offered by standard casinos for physical poker. The important aspects to take into account when designing mental poker protocols are: functionality, security, and computational and communication cost. Proposals in the literature usually focus on the first two items only. This makes comparisons difficult. This thesis starts with a formal cost analysis of the main proposals in the literature. The analysis is not limited to costs, though; security is also analyzed and, in fact, our study detected a fundamental weakness in one of the compared mental poker protocols. The attack is presented in a separate chapter after the global comparative analysis. The three following chapters of this thesis present three new protocols that enhance the proposals in the literature in different ways. The first proposal belongs to the family of TTP-free protocols and does not preserve the confidentiality of player strategies; it reduces the computational cost by avoiding the use of zero- knowledge proofs. The second proposal is TTP-free, preserves the confidentiality of player strategies and reduces the computational cost by requiring players to perform less mathematical operations.
    [Show full text]
  • MPF and PHMP
    MPF – Sergio Demian Lerner 1/83 MPF (Mental Poker Framework) A new family of practical and secure Mental Poker protocols Tesis de Licenciatura Autor: Sergio Demian Lerner Director: Dr. Hugo D. Scolnik Departamento de Computación Facultad de Ciencias Exactas y Naturales Universidad de Buenos Aires Noviembre de 2010 MPF – Sergio Demian Lerner 2/83 Agradecimientos A mi esposa Alush, que me alentó siempre a seguir mi camino. A mi hijo Ariel, por su infinita impaciencia. A mis padres, por enseñarme a aprender. A mi director, Dr. Hugo Scolnik, por darme la oportunidad y ayudarme. A los profesores de Exactas, que dan lo mejor de sí para engrandecer día a día la facultad. A mis amigos y en especial a Diego Bursztyn, por el puntapié inicial. Por último a Bruce Schneier, autor del primer libro sobre criptografía que cayó en mis manos. MPF – Sergio Demian Lerner 3/83 Table of Contents Abstract....................................................................................................................................................... 6 List of Figures.............................................................................................................................................. 7 List of Tables................................................................................................................................................ 7 1. Introduction.............................................................................................................................................. 8 1.1. Background.....................................................................................................................................
    [Show full text]
  • Cryptographic Primitives and Quantum Theory
    Cryptographic Primitives and Quantum Theory Claude CrCpeau Laboratoire d’hformatique de J’$cole Normale SupcXeure (CNRS URA 1327) * Abstract only using public key cryptography, but using quan- tum mechanics as a support. This paper summarizes the current knowledge in the field of two-party cryptographic protocols devised from quantum systems. We introduce the reader to the no- 2 Cryptographic Primitives tion of cryptographic protocols and describe a number of sample building blocks to achieve them. We also We now introduce the main two basic primitives give pointers for the reader who is interested to the that have been widely considered useful building quantum implementation of these building blocks. as blocks in the design of more elaborate cryptographic protocols: 1 Introduction Bit commitment: Alice can commit to the value of a bit b in such a way that Bob has no information Since the 1970’s the science of secret writing, cryp- about which bit it is, yet Alice can only open the tography, has changed substantially due to the intro- commitment to show the original bit b and not duction of “public key cryptosystems” [26, 411. The the opposite Tb. many properties of certain instances of these systems have open the door to several new applications (con- Oblivious transfer: Alice can send a bit b to Bob in sult [42, 25, 29, 44, 34, 28, 7, 30, 36, 32, 11, 19, 331 for such a way that the bit is received with proba- bility 50%. Neither party can influence the prob- instance, to mention just a few). The initial goal of cryptography, to provide secure communications, has ability that the bit is received.
    [Show full text]
  • Handout 11 Summary of This Handout: Certificates — Verisign — PGP — Commitment Schemes — Mental Coin Flipping — Mental Poker — Zero Knowledge Proofs
    06-20008 Cryptography The University of Birmingham Autumn Semester 2006 School of Computer Science Volker Sorge 12 December, 2006 Handout 11 Summary of this handout: Certificates — VeriSign — PGP — Commitment Schemes — Mental Coin Flipping — Mental Poker — Zero Knowledge Proofs IV.6 Digital Certificates For the public key ciphers as well as the digital signature algorithms discussed so far, we have only been concerned with the question how public keys can be generated, but not looked at the question how a public key can be published securely. We have simply assumed that Alice’s public key, once published, is available somewhere for Bob to encrypt messages and to check Alice’s signatures. However, Bob can never be absolutely certain that the public key he picks up has really been issued by Alice and not by some imposter. If a public key does not belong to the person that, for instance, claims has signed a message, Bob can be tricked into accepting and verifying signatures that are actually send by Mallory posing as Alice. It is therefore important that public keys can be trustedly associated with a particular party. This goal can be achieved by digital certificates. We note that in a symmetric key system, we do not have to certify which key belongs to which partici- pating party, as we assume that the key distribution is secure and that keys are only in the hands of the parties legitimately participating in the communication. Only if the key distribution mechanism fails or a key is compromised we have to renew and redistribute the common symmetric key to all parties involved, which should lead again to a closed and secure system.
    [Show full text]
  • Secure Fault-Tolerant Protocols and the Public-Key Model
    Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model (Extended Abstract) Zvi Galil'. 2* Stuart Habedl Moti Yung'r 3*4 Department of Computer Science, Columbia University Department of Computer Science, Tei Aviv University We give a general procedure for designing correct, secure, and fault-tolerant cryptographic protocols for many parties, thus enlarging the domain of tasks that can be performed efficiently by cryptographic means. We model the most general sort of feasible adversarial behavior, and describe fault-recovery procedures that can tolerate it. Our constructions minimize the use of cryptographic resources. By applying the complexity-theoretic approach to knowledge, we are able to measure and control the computational knowledge released to the various users, as well as its temporal availability. Supported in part by NSF grants MCS-8303139 and DCR-8511713. Supported in part by an IBM graduate fellowship. C. Pomerance (Ed.): Advances in Cryptology - CRYPT0 '87, LNCS 293, pp. 135-155, 1988. 0 Springer-Verlag Berlin Heidelberg 1988 136 s-rg An important area of research in cryptography is the design of protocols for cawing on certain uansactions in a communications network, such as playing poker or holding an election. Many of the pr~tocolsproposed in this area have required the expensive on-line generation of a large number of new keys. On the other hand, fundamental research in the traditional problems of cryptography, such as encryption and authentication, has developed the public-key model, in which each user has a single validated public key. This model is appropriate to those situations in which generation and validation of new keys is very costly or is othewise limited.
    [Show full text]
  • Cryptographic Algorithms for Privacy-Preserving Online Applications
    Mathematical Foundations of Computing doi:10.3934/mfc.2018015 c American Institute of Mathematical Sciences Volume 1, Number 4, November 2018 pp. 311{330 CRYPTOGRAPHIC ALGORITHMS FOR PRIVACY-PRESERVING ONLINE APPLICATIONS Ruinian Li Computer Science Department Bowling Green State University Bowling Green, Ohio 43401, USA Yinhao Xiao and Cheng Zhang Computer Science Department George Washington University 2121 I St NW, Washington, DC 20052, USA Tianyi Song Computer Science Department Bowling Green State University Bowling Green, Ohio 43401, USA Chunqiang Hu∗ School of Big Data and Software Engineering Chongqing University Chongqing, China (Communicated by Zhipeng Cai) Abstract. Privacy in online applications has drawn tremendous attention in recent years. With the development of cloud-based applications, protecting users' privacy while guaranteeing the expected service from the server has become a significant issue. This paper surveyed the most popular cryptographic algorithms in privacy-preserving online applications to provide a tutorial-like introduction to researchers in this area. Particularly, this paper focuses on introduction to homomorphic encryption, secret sharing, secure multi-party computation and zero-knowledge proof. 1. Introduction. Cloud computing [60] and big data [45] technology have been developed rapidly in the last decade, and privacy protection in online applications has become a more critical issue than ever before. Nowadays users are becoming more aware of their privacy issues when utilizing online service, and great efforts are made by researchers in building secure and robust applications with privacy protection. In this paper, we surveyed recent research in privacy-preserving online applications, and introduce the most popular and powerful cryptographic mecha- nisms in building practical applications.
    [Show full text]
  • Bit Commitment Was Acheived from in a Quantum Computation Model It Was first Believed Any One-Way Function [NOV06]
    Commitment Claude Cre´peau ∗ 1 Commitment [B] Unveiling the content of the envelope is achieved by opening it and extracting the piece of paper inside (see A commitment scheme is a two-phase cryptographic pro- Figure 2). tocol between two parties, a sender and a receiver, satis- The terminology of commitments, influenced by the le- fying the following constraints. At the end of the Com- gal vocabulary, first appeared in the contract signing pro- mit phase the sender is committed to a specific value (of- tocols of Shimon Even [Eve82], although it seems fair to ten a single bit) that he cannot change later on (Commit- attribute the concept to Manuel Blum [Blu82] who im- ments are binding) and the receiver should have no in- plicitly uses it for coin flipping around the same time. In formation about the committed value, other than what he his Crypto 81 paper, Even refers to Blums contribution already knew before the protocol (Commitments are con- saying: “In the summer of 1980, in a conversation, M. cealing). In the Unveil phase, the sender sends extra in- Blum suggested the use of randomization for such pro- formation to the receiver that allows him to determine the tocols”. So apparently Blum introduced the idea of us- value that was concealed by the commitment. Bit commit- ing random hard problems to commit to something (coin, ments are important components of zero-knowledge pro- contract, etc). However, one can also argue that the earlier tocols [GMW91, BCC88], and other more general two- work of Shamir, Rivest and Adleman [SRA81] on “men- party cryptographic protocols [Kil88].
    [Show full text]
  • Secure Multi-Party Computation for Cloud-Based Control
    Secure Multi-party Computation for Cloud-based Control Andreea B. Alexandru and George J. Pappas Abstract In this chapter, we will explore the cloud-outsourced privacy-preserving computation of a controller on encrypted measurements from a (possibly distributed) system, taking into account the challenges introduced by the dynamical nature of the data. The privacy notion used in this work is that of cryptographic multi-party privacy, i.e., the computation of a functionality should not reveal anything more than what can be inferred only from the inputs and outputs of the functionality. The main theoretical concept used towards this goal is Homomorphic Encryption, which allows the evaluation of sums and products on encrypted data, and, when combined with other cryptographic techniques, such as Secret Sharing, results in a powerful tool for solving a wide range of secure multi-party problems. We will rigorously define these concepts and discuss how multi-party privacy can be enforced in the implementation of a Model Predictive Controller, which encompasses computing stabilizing control actions by solving an optimization problem on encrypted data. 1 Introduction Cloud computing has become a ubiquitous tool in the age of big data and geographically-spread systems, due to the capabilities of resource pooling, broad network access, rapid elasticity, measured service and on-demand self-service, as defined by NIST [55]. The computational power and storage space of a cloud service can be distributed over multiple servers. Cloud computing has been employed for machine learning applications in e.g., healthcare monitoring and social networks, smart grid control and other control engineering applications, and integration with arXiv:1906.09652v1 [eess.SY] 23 Jun 2019 the Internet of Things paradigm [69, 15].
    [Show full text]
  • Bibliography on Mental Poker
    Bibliography on Mental Poker Heiko Stamer [email protected] Version 1.6 Abstract This bibliography maintains some references to scientific papers on the so-called “Mental Poker” problem: it asks whether it is possible to play a fair game of poker without physical cards and without a trusted dealer, i.e., by phone or over the Internet. This question has raised some interesting solutions in the early days of public research in cryptography and stimulated some important considerations like semantic security. Nowadays it gains again some attention due to the freaky hype of cryptocurrencies. References [AskarovSabelfeld:2005] Aslan Askarov and Andrei Sabelfeld. Security- Typed Languages for Implementation of Cryptographic Pro- tocols: A Case Study of Mutual Distrust. Technical Report 2005-13, Department of Computer Science and Engineering, Chalmers University of Technology and Goeborg¨ Univer- sity, 2005. [AskarovSabelfeld:2005:ESORICS] Aslan Askarov and Andrei Sabelfeld. Security-Typed Languages for Implementation of Crypto- graphic Protocols: A Case Study. In Sabrina De Capitani di Vimercati, Paul F. Syverson, and Dieter Gollmann, ed- itors, Computer Security - ESORICS 2005, Proceedings of the 10th European Symposium on Research in Computer Security, volume 3679 of Lecture Notes in Computer Science, pages 197– 221. Springer Verlag, 2005. 1 Abstract: Security protocols are critical for pro- tecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these pro- tocols lack the same level of attention and thus may be more exposed to attacks. This paper dis- cusses security assurance provided by security- typed languages when implementing crypto- graphic protocols. Our results are based on a case study using Jif, a Java-based security-typed language, for implementing a non-trivial crypto- graphic protocol that allows playing online poker without a trusted third party.
    [Show full text]
  • Privacy Homomorphisms for E-Gambling and Mental Poker Jordi Castella-Roca,` Vanesa Daza, Josep Domingo-Ferrer, Senior Member, IEEE, and Francesc Sebe´
    Privacy Homomorphisms for E-Gambling and Mental Poker Jordi Castella-Roca,` Vanesa Daza, Josep Domingo-Ferrer, Senior Member, IEEE, and Francesc Sebe´ Abstract— With the development of computer networks, situ- 3) The encrypted deck of cards is processed sequentially by ations where a set of players remotely play a game (e-gaming) all the players. During this process, the player receives have become usual. Often players play for money (e-gambling), the set C, permutes its elements and then re-masks (i.e. which requires standards of security similar to those in physical gambling. Cryptographic tools have been commonly used so far re-encrypts) them. The set resulting from the previous to provide security to e-gambling. Homomorphic encryption is step corresponds to the shuffled encrypted deck of cards. an example of such tools. The shuffled encrypted deck of cards is made up of 52 In this paper we review the mental poker protocols, where encrypted values such that none of the players knows which players are assumed to remotely play poker. We focus on the key advantage of using cryptosystems with homomorphic properties card is contained in each. Note that if Step 3 consisted of a (privacy homomorphisms) because they offer the possibility of single permutation, at least the player who performed Step 2 manipulating cards in encrypted form. would know the content of the final shuffled and encrypted Index Terms— Cryptography, privacy homomorphism, mental deck since she knows which cryptogram corresponds to each poker card. For a secure generation of the encrypted shuffled deck, it is necessary that, after permuting the encrypted deck, its elements are re-masked.
    [Show full text]