Title :
Weakly secret bit commitment: applications to lotteries and fair exchange
Author_Institution :
Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
Abstract :
The paper presents applications for the weak protection of secrets in which weakness is not just acceptable but desirable. For one application, two versions of a lottery scheme are presented in which the result of the lottery is determined by the ticket numbers purchased, but no one can control the outcome or determine what it is until after the lottery closes. This is because the outcome is kept secret in a way that is breakable after a predictable amount of time and/or computation. Another presented application is a variant on fair exchange protocols that requires no trusted third party at all
Keywords :
cryptography; protection; protocols; computation; fair exchange; fair exchange protocols; lotteries; purchased ticket numbers; time; weak secret protection; weakly secret bit commitment; Application software; Contracts; Costs; Cryptography; Distributed computing; Laboratories; Law; Legal factors; Protection; Protocols;
Conference_Titel :
Computer Security Foundations Workshop, 1998. Proceedings. 11th IEEE
Conference_Location :
Rockport, MA
Print_ISBN :
0-8186-8488-7
DOI :
10.1109/CSFW.1998.683149