Skip to main content
Home

Main navigation

  • Home
  • Books
  • Contact
    • Contact Form

Breadcrumb

  1. Home

Table of Contents for Policing Online Games

Preface
1 Cheating 1
1.1 How Cheaters Prosper . . 2
1.2 Stopping Cheaters 4
1.3 Using the Book 7
2 Encryption 9
2.1 Encryption Tools 10
2.2 Uses 14
2.3 Encryption Basics 15
2.3.1 Modulo Arithmetic 15
2.3.2 Diffie-Hellman Key Exchange 16
2.4 RSA 17
2.5 Conclusion 18
2.5.1 Lessons 18
3 Synchronized 21
3.1 Synchrony 21
3.2 Basic Structure 22
3.3 Trading Time for Secrecy 23
3.3.1 Bluffing 24
3.4 Conclusion 24
3.4.1 Lessons 24
4 Bit Commitment 27
4.1 Commitment 28
4.2 Practical Considerations 28
4.2.1 Adding Structure 29
4.2.2 Adding Randomness 30
4.3 Using Encryption Functions 30
4.4 Conclusion 31
4.4.1 Lessons 32
5 Randomness 33
5.1 Remote Viewing 34
5.2 Hashing A Random Number 34
5.3 Preventing Eavesdroppers 35
5.3.1 More than Two People 36
5.4 Attacks 36
5.5 Conclusion 37
5.5.1 Lessons 38
6 Lottery 41
6.1 Lotto Tickets 41
6.2 Printing Lottery Tickets 42
6.3 Conclusion 43
6.3.1 Lessons 43
7 Cards 45
7.1 Dealing a Hand 45
7.2 Commutative Encryption 46
7.2.1 Implementation Details 47
7.2.2 Creating the Cards 48
7.3 Extending the Algorithm for Many Players 49
7.3.1 Shuffling 49
7.3.2 Dealing the Cards 50
7.4 Conclusion 50
7.4.1 Lessons 50
8 Veils 53
8.1 Obscuring the Information 54
8.2 Splitting the Information 55
8.2.1 Encrypting the Information 55
8.3 Hiding a Tree in a Forest 56
8.4 Conclusion 57
8.4.1 Lessons 57
9 Signatures 59
9.1 Digital Signatures for Data Structures 60
9.1.1 Passcodes for MACs 60
9.2 Hierarchies and Hash Trees 61
9.3 Reducing the Output 62
9.4 Conclusion 62
9.4.1 Lessons 63
10 Certificates 65
10.1 Certificates of Authenticity 65
10.2 Hierarchies of Signatures 66
10.2.1 Trees versus Webs 67
10.3 Key Schemes 68
10.3.1 Key Expiration 69
10.4 Conclusion 69
10.4.1 Lessons 70
11 Provenance 71
11.1 Ownership 71
11.2 A Basic Scheme 72
11.3 Disputes and Cheating 73
11.4 Conclusion 74
11.4.1 Lessons 75
12 Blind Signatures 77
12.1 Blind Trust 78
12.2 The Basic Algorithm 78
12.3 Multiple Key Control 79
12.4 Conclusion 80
12.4.1 Lessons 80
13 Cash 83
13.1 Serial Numbers and Signatures 84
13.2 Transactions 85
13.2.1 Peer-to-Peer 85
13.2.2 Making Change 86
13.3 Removing the Central Bank 87
13.3.1 Multiple Audits 87
13.4 Conclusion 88
13.4.1 Lessons 88
14 Expendable 91
14.1 Once and Again 91
14.2 One-Time Nonces 92
14.2.1 Public Key Tricks 93
14.3 Access Chains 93
14.4 Date-stamped Access 94
14.5 Conclusion 95
14.5.1 Lessons 95
15 Oblivious Transfer 97
15.1 Pick a Card 97
15.2 The Algorithm 98
15.2.1 Just Two At Once 98
15.2.2 Handling More than Two Choices 99
15.3 Conclusion 100
15.3.1 Lessons 101
  • Log in to post comments

Books

  • Agents Unleashed
  • Attention Must Be Paid, But for $800?
  • Compression Algorithms
  • Digital Cash 2nd Edition
  • Digital Copyright Protection
  • Disappearing Cryptography 1st Edition
  • Disappearing Cryptography 2nd Edition
  • Disappearing Cryptography 3rd Edition
  • Free for All
  • Future Ride
  • How To Hide Online
  • Java Beans Programming
  • Java RAMBO Manifesto
  • Policing Online Games
    • Errata for Policing Online Games
    • FAQ for Policing Online Games
    • Table of Contents for Policing Online Games
  • SAT Sneak Attack
  • Translucent Databases
RSS feed
Powered by Drupal