Table of Contents for Policing Online Games
Preface |
|
1 Cheating |
1 |
1.1 How Cheaters Prosper . . |
2 |
1.2 Stopping Cheaters |
4 |
1.3 Using the Book |
7 |
2 Encryption |
9 |
2.1 Encryption Tools |
10 |
2.2 Uses |
14 |
2.3 Encryption Basics |
15 |
2.3.1 Modulo Arithmetic |
15 |
2.3.2 Diffie-Hellman Key Exchange |
16 |
2.4 RSA |
17 |
2.5 Conclusion |
18 |
2.5.1 Lessons |
18 |
3 Synchronized |
21 |
3.1 Synchrony |
21 |
3.2 Basic Structure |
22 |
3.3 Trading Time for Secrecy |
23 |
3.3.1 Bluffing |
24 |
3.4 Conclusion |
24 |
3.4.1 Lessons |
24 |
4 Bit Commitment |
27 |
4.1 Commitment |
28 |
4.2 Practical Considerations |
28 |
4.2.1 Adding Structure |
29 |
4.2.2 Adding Randomness |
30 |
4.3 Using Encryption Functions |
30 |
4.4 Conclusion |
31 |
4.4.1 Lessons |
32 |
5 Randomness |
33 |
5.1 Remote Viewing |
34 |
5.2 Hashing A Random Number |
34 |
5.3 Preventing Eavesdroppers |
35 |
5.3.1 More than Two People |
36 |
5.4 Attacks |
36 |
5.5 Conclusion |
37 |
5.5.1 Lessons |
38 |
6 Lottery |
41 |
6.1 Lotto Tickets |
41 |
6.2 Printing Lottery Tickets |
42 |
6.3 Conclusion |
43 |
6.3.1 Lessons |
43 |
7 Cards |
45 |
7.1 Dealing a Hand |
45 |
7.2 Commutative Encryption |
46 |
7.2.1 Implementation Details |
47 |
7.2.2 Creating the Cards |
48 |
7.3 Extending the Algorithm for Many Players |
49 |
7.3.1 Shuffling |
49 |
7.3.2 Dealing the Cards |
50 |
7.4 Conclusion |
50 |
7.4.1 Lessons |
50 |
8 Veils |
53 |
8.1 Obscuring the Information |
54 |
8.2 Splitting the Information |
55 |
8.2.1 Encrypting the Information |
55 |
8.3 Hiding a Tree in a Forest |
56 |
8.4 Conclusion |
57 |
8.4.1 Lessons |
57 |
9 Signatures |
59 |
9.1 Digital Signatures for Data Structures |
60 |
9.1.1 Passcodes for MACs |
60 |
9.2 Hierarchies and Hash Trees |
61 |
9.3 Reducing the Output |
62 |
9.4 Conclusion |
62 |
9.4.1 Lessons |
63 |
10 Certificates |
65 |
10.1 Certificates of Authenticity |
65 |
10.2 Hierarchies of Signatures |
66 |
10.2.1 Trees versus Webs |
67 |
10.3 Key Schemes |
68 |
10.3.1 Key Expiration |
69 |
10.4 Conclusion |
69 |
10.4.1 Lessons |
70 |
11 Provenance |
71 |
11.1 Ownership |
71 |
11.2 A Basic Scheme |
72 |
11.3 Disputes and Cheating |
73 |
11.4 Conclusion |
74 |
11.4.1 Lessons |
75 |
12 Blind Signatures |
77 |
12.1 Blind Trust |
78 |
12.2 The Basic Algorithm |
78 |
12.3 Multiple Key Control |
79 |
12.4 Conclusion |
80 |
12.4.1 Lessons |
80 |
13 Cash |
83 |
13.1 Serial Numbers and Signatures |
84 |
13.2 Transactions |
85 |
13.2.1 Peer-to-Peer |
85 |
13.2.2 Making Change |
86 |
13.3 Removing the Central Bank |
87 |
13.3.1 Multiple Audits |
87 |
13.4 Conclusion |
88 |
13.4.1 Lessons |
88 |
14 Expendable |
91 |
14.1 Once and Again |
91 |
14.2 One-Time Nonces |
92 |
14.2.1 Public Key Tricks |
93 |
14.3 Access Chains |
93 |
14.4 Date-stamped Access |
94 |
14.5 Conclusion |
95 |
14.5.1 Lessons |
95 |
15 Oblivious Transfer |
97 |
15.1 Pick a Card |
97 |
15.2 The Algorithm |
98 |
15.2.1 Just Two At Once |
98 |
15.2.2 Handling More than Two Choices |
99 |
15.3 Conclusion |
100 |
15.3.1 Lessons |
101 |
Zircon - This is a contributing Drupal Theme
Design by
WeebPal.