How to Use Bitcoin to Play Internet Poker
نویسندگان
چکیده
We present practical protocols for playing poker over the internet without having to trust a third party. Our poker protocols are dropout-tolerant in the sense that any party that drops out during the middle of the game is forced to pay a monetary penalty to all other parties. More generally, we introduce and design protocols for secure cash distribution with penalties, a primitive that simultaneously generalizes secure computation with penalties of Bentov and Kumaresan (Crypto 2014), and secure lottery with penalties of Andrychowicz et al. (Security and Privacy 2014). Since secure cash distribution with penalties is a reactive functionality by design, it suffices to capture a wide variety of card games (including poker), board games, and auctions. Our protocol realizing secure cash distribution with penalties works in a hybrid model where parties have access to a claim-or-refund transaction functionality F CR which can be efficiently realized in (a variant of) Bitcoin.
منابع مشابه
Role of Internet Dependency on Online Social Capital among Graduate Students in University of Putra Malaysia
This study examined to study how respondents rely on the Internet to fulfill the various life goals dimensioned into understanding, orientation and playing goals, and how this dependency relates to the generation of social capital. Further, it examined the resources of social capital in terms of bonding social capita and bridging social capital. In this study quantitative research approach was ...
متن کاملBibliography on Mental Poker
The bibliography contains references to scientific papers on cryptographic protocols and even implementations which solve the socalled “Mental Poker” problem. This problem asks whether it is possible to play a fair game of poker without cards and without a trusted dealer, e.g. by phone or over the Internet. This question had been a large impact in the early days of public research in cryptograp...
متن کاملRole of internet in Formation of National Identity Using Analytical Model (Case Study: 18-30 years old youth in Kashan)
The present research has been conducted aiming at specifying how the youth use internet and how they are influenced of emerging media via survey as the research method. The statistical population (200445) consists of 18-30 years old youth in Kashan. The sample (384) was selected using random sampling method via Morgan table. To elaborate the hypotheses, Tajfel's theory has been used to speci...
متن کاملInstantaneous Decentralized Poker
We present efficient protocols for amortized secure multiparty computation with penalties and secure cash distribution, of which poker is a prime example. Our protocols have an initial phase where the parties interact with a cryptocurrency network, that then enables them to interact only among themselves over the course of playing many poker games in which money changes hands. The high efficien...
متن کاملKaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement
The research on secure poker protocols without trusted intermediaries has a long history that dates back to modern cryptography’s infancy. Two main challenges towards bringing it into real-life are enforcing the distribution of the rewards, and penalizing misbehaving/aborting parties. Using recent advances on cryptocurrencies and blockchain technologies, Andrychowicz et al. (IEEE S&P 2014 and F...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014