Download presentation
Presentation is loading. Please wait.
Published byReginald Frank Cross Modified over 9 years ago
1
April 13, 2004 CS 551: CRyptography Applications Bistro Electronic National Lotteries Jessica Greer
2
April 13, 2004 CS 551: CRyptography Applications Bistro Agenda Large-scale electronic lotteries: What are they good for? (absolutely nothin’?) Requirements for electronic lottery systems Lotteries vs. Casinos Konstantinou’s protocol – does it meet the requirements?
3
April 13, 2004 CS 551: CRyptography Applications Bistro Large-scale E-Lotteries Advantages over mechanical systems: - Fast (high frequency) - Dynamic - Accessible - Efficient micropayment scheme
4
April 13, 2004 CS 551: CRyptography Applications Bistro Requirements Uniform distribution of generated numbers Unpredictable by anyone (even with access to history, audit logs) Unalterable – drawing and winner declaration Able to detect interference, errors (UK Lotto) Standardized, certifiable
5
April 13, 2004 CS 551: CRyptography Applications Bistro Requirements, cont’d.. Under regular scrutiny Details publicly available High availability Scalability
6
April 13, 2004 CS 551: CRyptography Applications Bistro Casinos vs. Lotteries Schneier’s solution: collaboration of gamblers for random number generation Lotteries: Users’ selections independent of one another
7
April 13, 2004 CS 551: CRyptography Applications Bistro Protocol Overview Initialization: Generator and verifier exchange keys for encryption, signature
8
April 13, 2004 CS 551: CRyptography Applications Bistro Protocol Overview 1. Generator draws sequence of bits from TRNG for seeding
9
April 13, 2004 CS 551: CRyptography Applications Bistro Protocol Overview 2. Generator executes bit-commitment protocol* on seed bit sequence * Seed commitment based on RSA encryption & RIPEMD-160 hashing 1. Generator draws sequence of bits from TRNG for seeding
10
April 13, 2004 CS 551: CRyptography Applications Bistro Protocol Overview 2. Generator executes bit-commitment protocol* on seed bit sequence * Seed commitment based on RSA encryption & RIPEMD-160 hashing 3. Resulting packet sent to Verifier, which signs the commitment
11
April 13, 2004 CS 551: CRyptography Applications Bistro Protocol Overview 3. Resulting packet sent to Verifier, which signs the commitment 4. Verifier sends generator a hash of file containing the coupons
12
April 13, 2004 CS 551: CRyptography Applications Bistro Protocol Overview 4. Verifier sends generator a hash of file containing the coupons 5. Generator concatenates seed with hash value from Verifier* *State-stamping step – freezes coupons
13
April 13, 2004 CS 551: CRyptography Applications Bistro Protocol Overview 5. Generator concatenates seed with hash value from Verifier 6. Generator feeds first part of original TRNG-generated bit sequence through Naor- Reingold function
14
April 13, 2004 CS 551: CRyptography Applications Bistro Protocol Overview 6. Generator feeds first part of original TRNG-generated bit sequence through Naor- Reingold function 7. Resulting bit stream XORed with 2 nd part of initial seed; this result is sent through several pseudorandom number generators
15
April 13, 2004 CS 551: CRyptography Applications Bistro Protocol Overview 7. Resulting bit stream XORed with 2 nd part of initial seed; this result is sent through several pseudorandom number generators 8. Generator opens initial random seed bits (de- commitment). Encrypts and signs seed & numbers; sends file to Verifier. Stops.
16
April 13, 2004 CS 551: CRyptography Applications Bistro Protocol Overview 8. Generator opens initial random seed bits (de- commitment). Encrypts and signs seed & numbers; sends file to Verifier. Stops. 9. Verifier authenticates file, decrypts it, recovers winning numbers + seed used to generate them
17
April 13, 2004 CS 551: CRyptography Applications Bistro Protocol Overview 9. Verifier authenticates file, decrypts it, recovers winning numbers + seed used to generate them 10. Verifier checks that Generator has committed to seed
18
April 13, 2004 CS 551: CRyptography Applications Bistro Protocol Overview 10. Verifier checks that Generator has committed to seed 10. Verifier uses seed to duplicate Generator’s tasks. If results match, finalize; if not, restart with Gen2
19
April 13, 2004 CS 551: CRyptography Applications Bistro Requirements Uniform distribution of generated numbers – TRNG’s + Naor-Reingold Unpredictable by anyone (even with access to history) - same Unalterable – drawing and winner declaration – Verifier auditing Able to detect interference, errors (UK Lotto) – Verifier auditing, audit logs Standardized, certifiable - ?
20
April 13, 2004 CS 551: CRyptography Applications Bistro Requirements, cont’d.. Under periodic scrutiny – alert function in case of discrepancies Details publicly available – paper… High availability – depends on hardware; some redundancy built-in Scalability - ?
21
April 13, 2004 CS 551: CRyptography Applications Bistro UK’s version http://www.national-lottery.co.uk/player/p/home/home.do
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.