scholarly journals A Secure Protocol for Exchanging Cards in P2P Trading Card Games Based on Transferable e-cash

2016 ◽  
Vol 3 (1) ◽  
pp. 26
Author(s):  
Marcos Silva ◽  
Marcos Junior

Trading card games (TCG) distinguish from traditional card games mainly because the cards are not shared between players in a match. Instead, users play with the cards they own (e.g., purchased or traded with other players), which corresponds to a subset of all cards produced by the game provider. Even though most computer-based TCGs rely on a trusted third-party (TTP) for preventing cheating during trades, allowing them to securely do so without such entity remains a challenging task. Actually, potential solutions are related to e-cash protocols, but, unlike the latter, TCGs require users to play with the cards under their possession, not only to be able to pass those cards over. In this work, we present the security requirements of TCGs and how they relate to e-cash. We then propose a concrete, TTP-free protocol for anonymously trading cards, using as basis a secure transferable e-cash protocol.

2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Peng Li ◽  
Junzuo Lai ◽  
Yongdong Wu

Numerous anonymous authentication schemes are designed to provide efficient authentication services while preserving privacy. Such schemes may easily neglect access control and accountability, which are two requirements that play an important role in some particular environments and applications. Prior designs of attribute-based anonymous authentication schemes did not concentrate on providing full anonymity while at the same time holding public traceability. To address this problem, we formally define and present a new primitive called traceable attribute-based anonymous authentication (TABAA) which achieves (i) full anonymity, i.e., both registration and authentication cannot reveal user’s privacy; (ii) reusable credential, i.e., a registered credential can be repeatedly used without being linked; (iii) access control, i.e., only when the user’s attribute satisfies the access policy can the user be involved in authentication; and (iv) public traceability, i.e., anyone, without help from the trusted third party, can trace a misbehaving user who has authenticated two messages corresponding to a common address. Then, we formally define the security requirements of TABAA, including unforgeability, anonymity, and accountability, and give a generic construction satisfying the security requirements. Furthermore, based on TABAA, we propose the first attribute-based, decentralized, fully anonymous, publicly traceable e-voting, which enables voters to engage in a number of different voting activities without repeated registration.


Author(s):  
Arthur B. Markman ◽  
Jonathan Cagan

Design communities in engineering and other disciplines have a practical reason for caring about group creativity. People employed in these areas have to generate creative solutions routinely, and they often must do so in a group. As a result, research in these areas has focused on processes to improve group creativity. This chapter explores techniques for generating problem statements and solutions in groups that have emerged from this literature. It also examines computer-based methods of problem solving that groups can use to enhance the ideas that arise from these group processes. This work has expanded the range of elements explored in studies of group creativity. Although theoretical studies of creativity can be useful in uncovering underlying mental processes, design development requires useful end products. The focus of this research on techniques that enhance creativity in design provides an opportunity to link this literature with the broader literature on individual and group creativity.


2022 ◽  
Vol 18 (1) ◽  
pp. 1-26
Author(s):  
Georgios Fragkos ◽  
Cyrus Minwalla ◽  
Eirini Eleni Tsiropoulou ◽  
Jim Plusquellic

Electronic cash ( e-Cash ) is a digital alternative to physical currency such as coins and bank notes. Suitably constructed, e-Cash has the ability to offer an anonymous offline experience much akin to cash, and in direct contrast to traditional forms of payment such as credit and debit cards. Implementing security and privacy within e-Cash, i.e., preserving user anonymity while preventing counterfeiting, fraud, and double spending, is a non-trivial challenge. In this article, we propose major improvements to an e-Cash protocol, termed PUF-Cash, based on physical unclonable functions ( PUFs ). PUF-Cash was created as an offline-first, secure e-Cash scheme that preserved user anonymity in payments. In addition, PUF-Cash supports remote payments; an improvement over traditional currency. In this work, a novel multi-trusted-third-party exchange scheme is introduced, which is responsible for “blinding” Alice’s e-Cash tokens; a feature at the heart of preserving her anonymity. The exchange operations are governed by machine learning techniques which are uniquely applied to optimize user privacy, while remaining resistant to identity-revealing attacks by adversaries and trusted authorities. Federation of the single trusted third party into multiple entities distributes the workload, thereby improving performance and resiliency within the e-Cash system architecture. Experimental results indicate that improvements to PUF-Cash enhance user privacy and scalability.


2019 ◽  
Author(s):  
Philip Garboden

The majority of rental properties in the U.S. today is owned by small- to medium-sized investors, many of whom enter the trade with little prior experience. This paper considers the cultural factors that motivate these amateurs to purchase real estate–an investment with high risks and relatively poor returns. Drawing on in-depth interviews with 93 investors in three heterogeneous real estate markets, Baltimore, MD, Dallas, TX, and Cleveland, OH, combined with participant observation of 22 real estate investment association meetings (REIAs), this paper finds that amateurs who decide to become investors often do so during periods when their professional identities are insecure or they perceive their retirement portfolios to be insufficient. Through participation in real estate investment associations and other investor networks, they quickly internalize “investor culture,” embracing ideologies of self-sufficiency and risk. “Investor culture”—perpetuated by REIAs--motivates and legitimizes strategies of action that lead to increasingly leveraged investments. Third-party actors, including real estate gurus, paid mentors, and private “hard money” lenders exploit the intersection of insecurity and the propagation of investor culture to profit off amateurs’ investment decisions.


Author(s):  
Ajaysinh Devendrasinh Rathod ◽  
Saurabh Shah ◽  
Vivaksha J. Jariwala

In recent trends, growth of location based services have been increased due to the large usage of cell phones, personal digital assistant and other devices like location based navigation, emergency services, location based social networking, location based advertisement, etc. Users are provided with important information based on location to the service provider that results the compromise with their personal information like user’s identity, location privacy etc. To achieve location privacy of the user, cryptographic technique is one of the best technique which gives assurance. Location based services are classified as Trusted Third Party (TTP) & without Trusted Third Party that uses cryptographic approaches. TTP free is one of the prominent approach in which it uses peer-to-peer model. In this approach, important users mutually connect with each other to form a network to work without the use of any person/server. There are many existing approaches in literature for privacy preserving location based services, but their solutions are at high cost or not supporting scalability.  In this paper, our aim is to propose an approach along with algorithms that will help the location based services (LBS) users to provide location privacy with minimum cost and improve scalability.


2015 ◽  
Vol 4 (1) ◽  
pp. 17-28
Author(s):  
Renée Ridgway

‘Cybercapitalism’, commonly termed ‘digital capitalism’, refers to the Internet, or ‘cyber- space’ and seeks to engage in business models within this territory in order to make financial profit. Cybercapitalism is structured by a highly intricate series of communication networks, which connect us through our participation on social platforms, but outside of these platforms how do we navigate and explore this information superhighway? We do so predominantly through search requests. Algorithms ostensibly know what we want before we even type them, as with Google’s ‘autocomplete’. Thus search is not merely an abstract logic but a lived practice that helps manage and sort the nature of information we seek as well as the direction of our queries. Nowadays it has become clear that users pay for such services with their data, which is increasingly the means to finance various corporations’ growth as they sell this data to third party advertisers. It is a transaction and in the exchange we get relevance. But is this really true? 


Sign in / Sign up

Export Citation Format

Share Document