Skip to main content

Design and Implementation of a Secure Online Lottery System

  • Conference paper
Advances in Information Technology (IAIT 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 344))

Included in the following conference series:

Abstract

Government has the authority to operate lottery schemes. Since the operation of the lottery system is controlled by the government, there are issues with public trust. The people may speculate that the lottery is rigged. This issue becomes critical with an online lottery system since the unprotected data can be easy manipulated. If all combinations which have been sold are known before the drawing, the government may draw winning numbers which pay the least. Moreover, winning tickets may be added after the drawing. As a result, corruption may be inevitable. The government should operate lottery schemes with integrity which include transparency and accountability.

This paper presents the design and the implementation of a secure online lottery system. The proposed system can provide accuracy, privacy, transparency, and verifiability. Using the proposed system, the government can operate lottery schemes with integrity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Title 44 of the United States Code § 3542 (b) (1), United States Government Printing Office (2008)

    Google Scholar 

  2. U.S. Department of Commerce/National Institute of Standards and Technology (NIST), Standards for Security Categorization of Federal Information and Information Systems (FIPS PUB 199) (2004)

    Google Scholar 

  3. What is good governance? UNESCAP (2009), http://www.unescap.org/pdd/prs/ProjectActivities/Ongoing/gg/governance.asp

  4. World Lottery Association, The World Lottery Association Values, http://www.world-lotteries.org/

  5. The Internet Engineering Task Force (IETF), Internet Security Glossary, RFC 2828 (2000)

    Google Scholar 

  6. lottery, in Encyclopædia Britannica, Encyclopædia Britannica Online (2009), http://www.britannica.com/EBchecked/topic/348555/lottery

  7. Zhou, J., Tan, C.: Playing Lottery on the Internet. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 189–201. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Liu, Y., et al.: A New Efficient E-Lottery Scheme Using Multi-Level Hash Chain. In: International Conference on Communication Technology, pp. 1–4 (2006)

    Google Scholar 

  9. Goldschlag, D.M., Stubblebine, S.G.: Publicly Verifiable Lotteries: Applications of Delaying Functions. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 214–226. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  10. Sako, K.: Implementation of a Digital Lottery Server on WWW. In: Baumgart, R. (ed.) CQRE 1999. LNCS, vol. 1740, pp. 101–108. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  11. The International Telecommunication Union (ITU), Data Communication Network: Open Systems Interconnection (OSI); Security, Structure and Applications (1991)

    Google Scholar 

  12. Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World, 2nd edn. Prentice Hall PTR, Upper Saddle River (2002)

    Google Scholar 

  13. Stallings, W.: Cryptography and Network Security, 4th edn. Prentice Hall, Upper Saddle River (2006)

    Google Scholar 

  14. Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC, New York (2007)

    Google Scholar 

  15. U.S. Department of Commerce/National Institute of Standards and Technology (NIST), Data Encryption Standard (DES) (FIPS PUB 46-3) (1999)

    Google Scholar 

  16. Hevia, A., Kiwi, M.: Strength of Two Data Encryption Standard Implementations under Timing Attacks. ACM Transactions on Information and System Security 2(4), 416–437 (1999)

    Article  Google Scholar 

  17. U.S. Department of Commerce/ National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES) (FIPS PUB 197) (2001)

    Google Scholar 

  18. RSA Cryptography Standard, PKCS #1 v2.1. (2002)

    Google Scholar 

  19. Chaum, D.: Blind Signatures for Untraceable Payments. In: Advances in Cryptology: Proceedings of Crypto, pp. 199–203 (1982)

    Google Scholar 

  20. Gao, J.Z., Prakash, L., Jagatesan, R.: Understanding 2D-Barcode Technology and Applications in M Commerce–Design and Implementation of a 2D Barcode Processing Solution. In: 31st Annual International Conference on Computer Software and Applications, vol. 2, pp. 49–56 (2007)

    Google Scholar 

  21. QR Code, http://www.denso-wave.com/qrcode/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kuacharoen, P. (2012). Design and Implementation of a Secure Online Lottery System. In: Papasratorn, B., Charoenkitkarn, N., Lavangnananda, K., Chutimaskul, W., Vanijja, V. (eds) Advances in Information Technology. IAIT 2012. Communications in Computer and Information Science, vol 344. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35076-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35076-4_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35075-7

  • Online ISBN: 978-3-642-35076-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics