How to Use Bitcoin to Play Internet Poker

نویسندگان

  • Ranjit Kumaresan
  • Tal Moran
  • Iddo Bentov
چکیده

We present practical protocols for playing poker over the internet without having to trust a third party. Our poker protocols are dropout-tolerant in the sense that any party that drops out during the middle of the game is forced to pay a monetary penalty to all other parties. More generally, we introduce and design protocols for secure cash distribution with penalties, a primitive that simultaneously generalizes secure computation with penalties of Bentov and Kumaresan (Crypto 2014), and secure lottery with penalties of Andrychowicz et al. (Security and Privacy 2014). Since secure cash distribution with penalties is a reactive functionality by design, it suffices to capture a wide variety of card games (including poker), board games, and auctions. Our protocol realizing secure cash distribution with penalties works in a hybrid model where parties have access to a claim-or-refund transaction functionality F CR which can be efficiently realized in (a variant of) Bitcoin.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role of Internet Dependency on Online Social Capital among Graduate Students in University of Putra Malaysia

This study examined to study how respondents rely on the Internet to fulfill the various life goals dimensioned into understanding, orientation and playing goals, and how this dependency relates to the generation of social capital. Further, it examined the resources of social capital in terms of bonding social capita and bridging social capital. In this study quantitative research approach was ...

متن کامل

Bibliography on Mental Poker

The bibliography contains references to scientific papers on cryptographic protocols and even implementations which solve the socalled “Mental Poker” problem. This problem asks whether it is possible to play a fair game of poker without cards and without a trusted dealer, e.g. by phone or over the Internet. This question had been a large impact in the early days of public research in cryptograp...

متن کامل

Role of internet in Formation of National Identity Using Analytical Model (Case Study: 18-30 years old youth in Kashan)

The present research has been conducted aiming at specifying how the youth use internet and how they are influenced of emerging media via survey as the research method. The statistical population (200445) consists of 18-30 years old youth in Kashan. The sample (384) was selected using random sampling method via Morgan table. To elaborate the hypotheses, Tajfel&#39s theory has been used to speci...

متن کامل

Instantaneous Decentralized Poker

We present efficient protocols for amortized secure multiparty computation with penalties and secure cash distribution, of which poker is a prime example. Our protocols have an initial phase where the parties interact with a cryptocurrency network, that then enables them to interact only among themselves over the course of playing many poker games in which money changes hands. The high efficien...

متن کامل

Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement

The research on secure poker protocols without trusted intermediaries has a long history that dates back to modern cryptography’s infancy. Two main challenges towards bringing it into real-life are enforcing the distribution of the rewards, and penalizing misbehaving/aborting parties. Using recent advances on cryptocurrencies and blockchain technologies, Andrychowicz et al. (IEEE S&P 2014 and F...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014