원문정보
초록
영어
To prevent the problem of cheating, Chan et al. proposed an efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games. However, we show that the masquerade attacker not only can successfully collect valuable information about the messages being transmitted but also impersonate any player to replay the message cheating the innocent player. Chan et al.’s proposed EASES protocol fails to defend fair play for everyone in peer-to-peer massively multiplayer online games. Our cryptanalysis results are important for security engineers, who are responsible for the design and development in peer-to-peer massively multiplayer online games.
목차
1. Introduction
2. Review of EASES protocol
2.1. Phase 1: Initialization Phase.
2.2. Phase 2: Signing Phase.
2.3. Phase 3: Verification Phase.
2.4. Phase 4: Re-initialization Phase.
3. Cryptanalysis of the EASES protocol
4. Conclusion
Reference
