skip to main content
10.1145/1178823.1178908acmconferencesArticle/Chapter ViewAbstractPublication PagesesemConference Proceedingsconference-collections
Article

A proposal of encoded computations for distributed massively multiplayer online services

Published: 14 June 2006 Publication History

Abstract

This paper deals with Massively Multiplayer Online services, which are used to interact with other user in real time. Although it is possible to distribute the load on the server to users' computers, the distributed services are more vulnerable to cheating such as data theft. We propose a method for concealing data from a user who is authorized to manage the data. The method makes it possible to carry out various kinds of operations with data and program codes concealed. We show that concealed information can not be figured out with the knowledge of original programs or encoding keys which other users have.

References

[1]
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. P. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Proceedings of CRYPTO 2001, 2001.]]
[2]
A. R. Bharambe, S. Rao, and S. Seshan. Mercury: A scalable publish-subscribe system for Internet games. In Proceedings of NetGames 2002, 2002.]]
[3]
S. Chow, P. A. Eisen, H. Johnson, and P. C. van Oorschot. A white-box DES implementation for DRM applications. In Proceedings of DRM 2002, 2002.]]
[4]
S. Chow, Y. Gu, H. Johnson, and V. A. Zakharov. An approach to the obfuscation of control-flow of sequential computer programs. In Proceedings of ISC 2001, 2001.]]
[5]
C. Collberg, C. Thomborson, and D. Low. Breaking abstractions and unstructuring data structures. In Proceedings of ICCL '98, 1998.]]
[6]
R. Cramer, I. Damgård, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In Proceedings of Eurocrypt 2000, 2000.]]
[7]
E. Cronin, A. R. Kurc, B. Filstrup, and S. Jamin. An efficient synchronization mechanism for mirrored game architectures. Multimedia Tools and Applications, 23(1):7--30, 2004.]]
[8]
C. Diot and L. Gautier. A distributed architecture for multiplayer interactive applications on the Internet. IEEE Network, 13(4):6--15, 1999.]]
[9]
K. Endo, M. Kawahara, and Y. Takahashi. A distributed architecture for massively multiplayer online services with peer-to-peer support. In Proceedings of NetCon '05, 2005.]]
[10]
K. Endo, M. Kawahara, and Y. Takahashi. Cheat prevention for massively multiplayer online distributed services. IPSJ Journal, 47(4): 1087--1098, 2006.]]
[11]
C. GauthierDickey, D. Zappala, V. Lo, and J. Marr. Low latency and cheat-proof event ordering for peer-to-peer games. In Proceedings of NOSSDAV 2004, 2004.]]
[12]
G. Horng. A secure server-aided RSA signature computation protocol for smart cards. Journal of Information Science and Engineering, 16(6):847--855, 2000.]]
[13]
T. Iimura, H. Hazeyama, and Y. Kadobayashi. Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games. In Proceedings of NetGames 2004, 2004.]]
[14]
B. Knutsson, H. Lu, W. Xu, and B. Hopkins. Peer-to-peer support for massively multiplayer games. In Proceedings of Infocom 2004, 2004.]]
[15]
Q. Ma, W. Hao, I.-L. Yen, and F. Bastani. Multiparty computation with full computation power and reduced overhead. In Proceedings of HASE '04, 2004.]]
[16]
National Bureau of Standards. Data encryption standard. In FIPS Publication 46, 1977.]]
[17]
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of EUROCRYPT '99, 1999.]]
[18]
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120--126, 1978.]]
[19]
T. Sander and C. F. Tschudin. Towards mobile cryptography. In Proceedings of 1998 IEEE Symposium on Security and Privacy, 1998.]]

Cited By

View all
  • (2008)I3P: A Protocol for Increasing Reliability and Responsiveness in Massively Multiplayer GamesJournal of Advanced Computational Intelligence and Intelligent Informatics10.20965/jaciii.2008.p014212:2(142-149)Online publication date: 20-Mar-2008

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ACE '06: Proceedings of the 2006 ACM SIGCHI international conference on Advances in computer entertainment technology
June 2006
572 pages
ISBN:1595933808
DOI:10.1145/1178823
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 June 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. distributed massively multiplayer online services
  2. encoded computations
  3. interactive real-time applications
  4. peer-to-peer

Qualifiers

  • Article

Conference

ACE2006
Sponsor:

Acceptance Rates

Overall Acceptance Rate 36 of 90 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2008)I3P: A Protocol for Increasing Reliability and Responsiveness in Massively Multiplayer GamesJournal of Advanced Computational Intelligence and Intelligent Informatics10.20965/jaciii.2008.p014212:2(142-149)Online publication date: 20-Mar-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media