Abstract | ||
---|---|---|
This paper deals with massively multiplayer online services that are used for user interaction in real time. Although it is possible to distribute the load on a server to the users' computers, the distributed services are more vulnerable to cheating such as data theft. We propose a method for concealing the data from a user who is authorized to manage the data. The method makes it possible to carry out various kinds of operations, keeping both data and program codes concealed. We show that the concealed information cannot be figured out with the knowledge of the original programs or encoding keys possessed by the other users. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1016/j.comcom.2007.11.002 | Computer Communications |
Keywords | Field | DocType |
Secure computations,Distributed massively multiplayer online services,Peer-to-peer,Interactive real-time applications | Peer-to-peer,Computer security,Massively parallel,Computer science,Computer network,Real-time computing,Cheating,User interface,Data theft,Encoding (memory),Computation,Distributed services | Journal |
Volume | Issue | ISSN |
31 | 9 | Computer Communications |
Citations | PageRank | References |
0 | 0.34 | 13 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Keiichi Endo | 1 | 8 | 6.07 |
Minoru Kawahara | 2 | 17 | 7.06 |
Yutaka Takahashi | 3 | 104 | 7.24 |