25
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang Adaptive Computing and Networking Lab. National Central University 1

An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Embed Size (px)

Citation preview

Page 1: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer

Massively Multiplayer Online Games

Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Adaptive Computing and Networking Lab.National Central University

1

Page 2: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Outline

• Background• Related work– NEO– SEA

• The proposed scheme– EASES

• Evaluation• Conclusion

2

Page 3: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Background - MMOG

• Multiplayer online game• Massively multiplayer online game (MMOG)

3

Page 4: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Background - architectures

• Client-server

4

Page 5: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Background - architectures

• Server-cluster

5

Page 6: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Background - architectures

• Peer-to-peer (P2P) network• Efficiently maintain the topology– Virtual environment

6

Page 7: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Background – game logic

• In client-server and server-cluster– Server maintains game states– Users send event to server– Server sends information to player

77

time

round

Page 8: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Background – cheat problem

• Game logic is maintained by peers in P2P environments.

• Some players may gain advantages unfairly.

8

Page 9: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Background - commitment

• Play the paper, scissors, rock game remotely without arbiter

9

Page 10: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Background – hash function

• Cryptographic hash function• Strength depends on the following

infeasibilities– For any given hashed value, to find M or M’– For any given message M, to find H(M) = H(M’)– To find any pair (M, M’) such that H(M) = H(M’)

10

Hash function

010101110100

Page 11: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Background - commitment

• No one can get unfair advantages if the hash function is secure.

11

First send H(Choice | Random)

Then send (Choice | Random)

H(Choice | Random)Choice | Random

H(Choice | Random)Choice | Random

Page 12: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Background – digital signature

• Concept

12

A document To sign it

•No one can forge•Signer can’t repudiate that he executed the algorithm for this document•Authenticity of the document

010101000111010011001011010011100110101000110101011010111000110101010100110100011010101010101001010101010010101010101010……..

Signaturealgorithm

A digital signature

101001110100110010110110101100110101000110101010010111001011010101010011010010110101010101010010110110010101010101010111……..

Page 13: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Background – digital signature

• To sign a message

13

message 0101…101 1011…110

message 1011…110

Hash functionTo sign by sender’s private key

Page 14: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Background – digital signature

• To verify a signature

14

message 1011…110

0101…101 0101…101?

Hash functionTo inverse the signatureby signer’s public key

To check they are the same or not

Page 15: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Related work - NEO

15

Player i1 1{ ( )} , , ( )rA

r r r rA A A A A AK

M S U K S V

• Every updating message• Signing event updating message• Encrypting the signed message

• After, send decrypting key

Page 16: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Related work - SEA

16

Player i1 1 1

( , , , )

( , , , , )

r r rA A A

r r r r rA A A A A

Commit H U n SessID ID

M S Commit U Vh n r

• Every updating message• Signed hash value of event updating

message• After, send the plain message

Page 17: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

The problem that we observed

• Digital signature algorithms are too slow.

17

SingleDocumen

t

Hash algorithm

Signature algorithm

Signature

Original message To produce themessage digest

To sign themessage digest

Page 18: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

The objective

• To efficiently sign many discrete messages

18

Message 1

Message 2……

Message n

Page 19: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

The proposed EASES

• Initialization phase– Every player prepares the keys for signing.

• Signing phase– Every player signs his messages.

• Verification phase– Every receiver verifies the authenticity.

• Re-initialization phase– Re-generate new signing keys.

19

Page 20: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

EASES – initialization phase

20…

….

.

1011…110

Page 21: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

EASES – signing & verification

21

…….

…….

Send out

j

j

j-1

j-1

j

j

j+1

j+1

j+2

j+2

j-1

j-1

j-2

j-2

j-2

j-2

j-3

j-3

Page 22: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

EASES – re-initialization phase

• Re-execute initialization phase• A more efficient way– Reserve the last two keys

22

……

..

1011…110

……

..

Page 23: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Evaluation - performance

• Computational cost– Hash replaces signature function

• Memory consumption– 1,000 * 192 bits = 24,000 bytes, when n = 1,000

• Bandwidth consumption– Length of Hash value is short than signature’s

23

EASES Traditional Signature

Computation Better

Memory Better

Bandwidth Better

Page 24: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Evaluation - security

• Unforgeability– No one can claim that he signed M, unless he

show the OSK of M.– This requirement is secure if adopted

cryptographic hash function is secure.

• Verifiability– Hash function is public.

24

Page 25: An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang

Conclusion and discussion

• EASES is proposed to sign many discrete messages at once efficiently

• Security of EASES is as strong as those of traditional signature schemes

• ESAES implies the commitment property

25