At present, the trust problem of chess and card games on the market has not been solved with effective methods, and phenomena of cheating such as plug-ins are endless. Therefore, based on the characteristics of decentralization and tamper resistance of the current blockchain, we propose a card game anti-cheat method. This method uses the API to access the player's card information and applies the Huffman Merkle Hash tree (HuffMHT) algorithm to compress card information which is then encrypted by various encryption algorithms. At last, a smart contract is written to anchor the encrypted information on the blockchain. In the proposal, everyone has the access to compare the licensing information on the blockchain with the final complete card information to find out if they are cheating. Experimental results show that the proposed method is capable of solving the trust problem of card games effectively and enables a safe card game environment.
YUAN Chenjuan, SUN Guozi, LI Huakang, WANG Jitao
. Credible Depository Chain System of Card Games[J]. Journal of Applied Sciences, 2020
, 38(1)
: 81
-92
.
DOI: 10.3969/j.issn.0255-8297.2020.01.006
[1] 李兆森,李彩虹.基于区块链的电子数据存证应用研究[J].软件,2017, 38(8):63-67. Li Z S, Li C H. Application research of electronic data storage based on blockchain[J]. Software, 2017, 38(8):63-67.(in Chinese)
[2] 曹迪迪,陈伟.基于智能合约的以太坊可信存证机制[J].计算机应用,2019, 39(4):1073-1080. Cao D D, Chen W. Ethereum trusted deposit mechanism based on smart contract[J]. Journal of Computer Applications, 2019, 39(4):1073-1080.(in Chinese)
[3] Cebe M, Erdin E, Akkaya K, et al. Block4Forensic:an integrated lightweight blockchain framework for forensics applications of connected vehicles[J]. IEEE Communications Magazine, 2018, 56(10):50-57.
[4] Kevin D, David B. HACIT2:a privacy preserving, region based and blockchain application for dynamic navigation and forensics in VANET[C]//International Conference on Ad Hoc Networks. Cham:Springer, 2018.
[5] Bonomi S, Casini M, Ciccotelli C. B-CoC:a blockchain-based chain of custody for evidences management in digital forensics[J]. https://dblp.org/db/journals/corr/corr1807.html#abs-1807-10359
[6] 吴泽,李娜.基于Java的Socket模型通讯实现[J].许昌学院学报,2010, 29(2):74-77. Wu Z, Li N. Java-based socket model communication implementation[J]. Journal of Xuchang University, 2010, 29(2):74-77.(in Chinese)
[7] 王静,曲凤娟.基于Socket的多用户并发通信的设计[J].福建电脑,2007(3):164-165. Wang J, Qu F J. Design of multi-user concurrent communication based on socket[J]. Fujian Computer, 2007(3):164-165.(in Chinese)
[8] 王防修,周康.通过哈夫曼编码实现文件的压缩与解压[J].武汉轻工大学学报,2008, 27(4):46-49. Wang F X, Zhou K. Compression and decompression of files by Huffman coding[J]. Journal of Wuhan University of Light Industry, 2008, 27(4):46-49.(in Chinese)
[9] Koo D, Shin Y, Yun J, et al. An online data-oriented authentication based on Merkle tree with improved reliability[C]//IEEE International Conference on Web Services. IEEE, 2017.
[10] Jones P. US secure Hash algorithm 1(SHA1)[M]. RFC Editor, 2001.
[11] 夏沅.区块链智能合约技术应用[J].中国金融,2018(6):81-82. Xia Y. Application of smart contract technology in blockchain[J]. China Finance, 2018(6):81-82.(in Chinese)
[12] 黄洁华,高灵超,许玉壮,等.众筹区块链上的智能合约设计[J].信息安全研究, 2017, 3(3):211-219. Huang J H, Gao L C, Xu Y Z, et al. Smart contract design on crowdfunding blockchain[J]. Information Security Research, 2017, 3(3):211-219.(in Chinese)
[13] Kosba A, Miller A, Shi E. Hawk:the blockchain model of cryptography and privacypreserving smart contracts[J]. IEEE Symposium on Security and Privacy, 2016:839-858.
[14] Muñoz J L, Forné J, Esparza O, et al. Efficient certificate revocation system implementation:Huffman Merkle Hash tree (HuffMHT)[M]//Trust, Privacy, and Security in Digital Business, 2005.
[15] Zhou X W, Guo J W. HuffMHT-based entity authentication scheme for Ad Hoc networks[J]. Journal of Electronics&Information Technology, 2010, 32(4):852-856.
[16] 王防修,周康.通过哈夫曼编码实现文件的压缩与解压[J].武汉轻工大学学报,2008, 27(4):46-49. Wang F X, Zhou K. Compression and decompression of files via Huffman coding[J]. Journal of Wuhan University of Light Industry, 2008, 27(4):46-49.(in Chinese)
[17] Sediyono E, Santoso K I, Suhartono. Secure login by using one-time password authentication based on MD5 Hash encrypted SMS[C]//International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2013:1604-1608.
[18] Shrivastava A. Implementation of cryptographic Hash function SHA256 in C++[C]//APS March Meeting 2012. American Physical Society, 2012.