An Improved Non-Iterative Privacy Preservation Lotteries

نویسندگان

  • Juan Huang
  • Jihong Yan
  • Yining Liu
چکیده

In 2009, a non-iterative privacy preservation for online lotteries is proposed in IET Information Security by J.S lee, C.S Chan and C.C Chang [1], who claim their scheme achieve the following properties:  Privacy. No one can learn the choices made by lottery players except the players themselves.  Security. No one can counterfeit a winner or forge a winning lottery ticket to claim the prize.  Accuracy. Players can obtain their lottery ticket with preferred numbers.  Anonymity. The lottery ticket can not be linked to the identity of player.  Fairness. Each ticket shall be equally contributed to the winning set.  Convenience. Players need not sophisticated techniques or additional devices.  Public verification. the player shall be able to observe the winning result and verify his lottery ticket.  No online trusted third party needed.  Non-iterative t-out-of-n choice. In Lee-Chan-Chang’s scheme, the main participants include a lottery issuer(LI), a player Alice, an off-line trusted third party(TTP) and a bank(B). Lee-Chan-Chang’s scheme constructs t-out-of-n lottery ticket using the method of robust non-interactive oblivious transfer protocol designed by Yi Mu et al. in 2003[2]. tout-of-n oblivious transfer is defined as follows. Alice knows n messages and wants to send t of them to Bob, Bob gets t of them and knows which ones he has got, but Alice has no idea about which t messages Bob has received. In Lee-Chan-Chang’s scheme, LI knows and publishes n numbers and player Alice gets or selects t of n as his preferred number, then obtains corresponding ticket generated from these t number, LI knows nothing which t number has been chosen. In 2009, some weakness of Mu et al.’s method is analyzed by Chin-Chen Chang and Jung-san Lee [3]. In [3], adversary Bob maybe obtain more than t number through selecting proper public keys ) , ( 1 1 y x , ), , ( 2 2 y x ) , ( , n n y x  determined with

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Iterative Neural Based Method to Spot Price Forecasting

Electricity price predictions have become a major discussion on competitive market under deregulated power system. But, the exclusive characteristics of electricity price such as non-linearity, non-stationary and time-varying volatility structure present several challenges for this task. In this paper, a new forecast strategy based on the iterative neural network is proposed for Day-ahead price...

متن کامل

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

An iterative method for amenable semigroup and infinite family of non expansive mappings in Hilbert spaces

begin{abstract} In this paper, we introduce an iterative method for amenable semigroup of non expansive mappings and infinite family of non expansive mappings in the frame work of Hilbert spaces. We prove the strong convergence of the proposed iterative algorithm to the unique solution of a variational inequality, which is the optimality condition for a minimization problem. The results present...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013