WO2021115290A1 - Off-chain random number application method and device for blockchain game, and storage medium - Google Patents

Off-chain random number application method and device for blockchain game, and storage medium Download PDF

Info

Publication number
WO2021115290A1
WO2021115290A1 PCT/CN2020/134727 CN2020134727W WO2021115290A1 WO 2021115290 A1 WO2021115290 A1 WO 2021115290A1 CN 2020134727 W CN2020134727 W CN 2020134727W WO 2021115290 A1 WO2021115290 A1 WO 2021115290A1
Authority
WO
WIPO (PCT)
Prior art keywords
random number
user
generated
random
client
Prior art date
Application number
PCT/CN2020/134727
Other languages
French (fr)
Chinese (zh)
Inventor
俞铠俊
王志文
吴思进
Original Assignee
杭州复杂美科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州复杂美科技有限公司 filed Critical 杭州复杂美科技有限公司
Publication of WO2021115290A1 publication Critical patent/WO2021115290A1/en

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/75Enforcing rules, e.g. detecting foul play or generating lists of cheating players
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/131Protocols for games, networked simulations or virtual reality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

An off-chain random number application method and device for a blockchain game, and a storage medium. The method comprises: generating a first random number and first encrypted information, and broadcasting the first encrypted information to second user ends; receiving and storing second encrypted information respectively broadcasted by the second user ends; generating n-2 third random numbers and fourth random numbers, and sending same to n-1 second user ends respectively; receiving and storing fifth random numbers or sixth random numbers respectively sent by the second user ends; when second random numbers broadcasted by a first second user end are not received promptly, broadcasting the fifth random numbers or the sixth random numbers generated by the user end; receiving the fifth random numbers or the sixth random numbers generated by the user end and broadcasted by other second user ends; generating second random numbers generated by the user end according to n-2 fifth random numbers and sixth random numbers generated by the user end; and generating an off-chain random number.

Description

区块链游戏的链下随机数应用方法、设备和存储介质Off-chain random number application method, equipment and storage medium for blockchain games 技术领域Technical field
本申请涉及区块链游戏技术领域,具体涉及一种区块链游戏的链下随机数应用方法、设备和存储介质。This application relates to the technical field of blockchain games, in particular to an off-chain random number application method, device and storage medium for blockchain games.
背景技术Background technique
在游戏开局阶段和结算阶段上链、中间的游戏过程阶段不上链的区块链游戏机制,或,基于注册在区块链上的通道进行链下交易的交易机制(可参考CN201911073994.9)的区块链游戏机制中,游戏过程中需要使用随机数时,需要保障该随机数不被用户预测或操纵,以避免用户进行作弊。Blockchain game mechanisms that are not on the chain during the game's opening phase and settlement phase, and the middle game process stage is not on the chain, or the transaction mechanism of off-chain transactions based on channels registered on the blockchain (refer to CN201911073994.9) In the blockchain game mechanism, when a random number is needed during the game, it is necessary to ensure that the random number is not predicted or manipulated by the user to avoid cheating.
解决上述随机数问题的一种方式为,使用区块链上生成的随机数(例如CN109558112A所提供的随机数生成方法)。然而该方式的问题在于,随机数的生成依赖于区块链的挖矿机制,而区块链的挖矿和出块速度有限,因此所能提供的随机数数量有限,当链下的游戏过程中需要使用较多随机数时,链上随机数的数量无法满足游戏需求。One way to solve the above random number problem is to use random numbers generated on the blockchain (for example, the random number generation method provided by CN109558112A). However, the problem with this method is that the generation of random numbers depends on the mining mechanism of the blockchain, and the mining and block generation speed of the blockchain is limited. Therefore, the number of random numbers that can be provided is limited. When you need to use more random numbers in the game, the number of random numbers on the chain cannot meet the needs of the game.
解决上述随机数问题的另一种方式为,由参与游戏的各用户端共同生成链下随机数。例如,用户A/B/C进行一局游戏,游戏结果需要基于随机数r生成,A/B/C的用户端分别生成随机数a/b/c,并相互广播hash(a)/hash(b)/hash(c),从而在需要生成游戏结果时分别广播可验证的a/b/c,并生成随机数r=f(a,b,c),从而保障随机数r不会被用户预测或操纵。然而该方式存在的一个问题在于,当A/B的用户端分别广播a/b,而C的用户端还未广播c时,C的用户端已经可以生成随机数r并获知游戏结果,当用户C获知游戏结果不利时往往可能会选择下线或强制关闭游戏用户端而不广播c,从而导致A/B的用户端无法生成游戏结果,只能存证并举报用户C,非常影响游戏的用户体验。Another way to solve the above random number problem is to generate off-chain random numbers jointly by all users participating in the game. For example, if user A/B/C plays a game, the result of the game needs to be generated based on the random number r. The A/B/C user terminal generates random numbers a/b/c and broadcasts hash(a)/hash( b)/hash(c), so that when the game result needs to be generated, the verifiable a/b/c are broadcasted separately, and the random number r=f(a,b,c) is generated, so as to ensure that the random number r will not be used by the user Predict or manipulate. However, a problem with this method is that when the client of A/B broadcasts a/b and the client of C has not broadcast c, the client of C can already generate a random number r and learn the game result. When the user When C learns that the game result is unfavorable, he may choose to go offline or forcibly close the game client without broadcasting c. As a result, the A/B client cannot generate the game result and can only save the evidence and report the user C, which greatly affects the game user Experience.
发明内容Summary of the invention
鉴于现有技术中的上述缺陷或不足,期望提供一种保障在多人游戏中有一个用户恶意下线时仍能生成链下随机数和游戏结果以提升游戏用户体验的区块链游戏的链下随机数应用方法、设备和存储介质,并进一步期望完善该链下随机数机制。In view of the above-mentioned shortcomings or deficiencies in the prior art, it is desirable to provide a blockchain game chain that guarantees that when a user maliciously goes offline in a multiplayer game, off-chain random numbers and game results can be generated to enhance the game user experience. Under the random number application method, equipment and storage medium, and further hope to improve the random number mechanism under the chain.
第一方面,本发明提供一种区块链游戏的链下随机数应用方法,该游戏的参与人数为n,n不小于3,该方法适用于用户端,该方法包括:In the first aspect, the present invention provides an off-chain random number application method for a blockchain game. The number of participants in the game is n, and n is not less than 3. The method is suitable for the user side, and the method includes:
生成第一随机数,以及加密第一随机数所生成的第一加密信息,向参与本局游戏的各第二用户端广播第一加密信息;Generate a first random number, and encrypt the first encrypted information generated by encrypting the first random number, and broadcast the first encrypted information to each second user terminal participating in the game;
接收并存储各第二用户端分别广播的第二加密信息;其中,第二加密信息由第二用户端加密相应的第二随机数所生成;Receiving and storing the second encrypted information respectively broadcast by each second user terminal; wherein the second encrypted information is generated by encrypting the corresponding second random number by the second user terminal;
生成n-2个第三随机数,并根据第一随机数和n-2个第三随机数生成第四随机数,将n-2个第三随机数和第四随机数分别发送至n-1个第二用户端,使各第二用户端分别持有一个第三随机数或第四随机数;Generate n-2 third random numbers, and generate a fourth random number based on the first random number and n-2 third random numbers, and send n-2 third random numbers and fourth random numbers to n- One second client, so that each second client holds a third random number or a fourth random number;
接收并存储各第二用户端分别发送的第五随机数或第六随机数;其中,第五随机数由第二用户端生成,第六随机数由第二用户端根据第二随机数和n-2个第五随机数生成;Receive and store the fifth random number or the sixth random number respectively sent by each second user end; wherein, the fifth random number is generated by the second user end, and the sixth random number is generated by the second user end according to the second random number and n -2 fifth random number generation;
监测在生成链下随机数的时段是否收到各第二用户端广播的第二随机数:Monitor whether the second random number broadcast by each second user terminal is received during the period of generating the random number under the chain:
未收到第一第二用户端广播的第二随机数,则广播第一第二用户端所生成的第五随机数或第六随机数;以及,If the second random number broadcast by the first and second client is not received, broadcast the fifth random number or the sixth random number generated by the first and second client; and,
接收除第一第二用户端外的各第二用户端广播的第一第二用户端所生成的第五随机数或第六随机数;Receiving the fifth random number or the sixth random number generated by the first and second user terminals broadcast by each second user terminal except the first and second user terminals;
根据第一第二用户端所生成的n-2个第五随机数和第六随机数生成第一第二用户端所生成的第二随机数;Generating a second random number generated by the first and second user end according to the n-2 fifth random numbers and the sixth random number generated by the first and second user end;
根据第一随机数、接收的n-2个第二随机数和生成的1个第二随机数生成链下随机数。Generate an off-chain random number according to the first random number, the received n-2 second random numbers, and the generated 1 second random number.
第二方面,本发明还提供一种设备,包括一个或多个处理器和存 储器,其中存储器包含可由该一个或多个处理器执行的指令以使得该一个或多个处理器执行根据本发明各实施例提供的区块链游戏的链下随机数应用方法。In a second aspect, the present invention also provides a device, including one or more processors and a memory, where the memory contains instructions executable by the one or more processors to make the one or more processors execute each of the instructions according to the present invention. The embodiment provides an off-chain random number application method for blockchain games.
第三方面,本发明还提供一种存储有计算机程序的存储介质,该计算机程序使计算机执行根据本发明各实施例提供的区块链游戏的链下随机数应用方法。In a third aspect, the present invention also provides a storage medium storing a computer program that enables the computer to execute the off-chain random number application method of the blockchain game according to the embodiments of the present invention.
本发明诸多实施例提供的区块链游戏的链下随机数应用方法、设备和存储介质通过在多人游戏中由每个用户端将自身生成的随机数拆分成多份并分别发送至参与本局游戏的其它用户端,使得在任一用户端超时未公布自身生成的随机数时,其它用户端可以根据各自存储的随机数碎片恢复该超时未公布的随机数,从而生成链下随机数,保障游戏结果的生成,提升了游戏用户体验;The off-chain random number application method, device, and storage medium for blockchain games provided by many embodiments of the present invention divide the random number generated by each user into multiple copies and send them to participants in a multiplayer game. Other users of this game make that when any user does not announce the random number generated by itself over time, other users can restore the unannounced random number after the timeout according to the random number fragments stored in their own, so as to generate off-chain random numbers to ensure The generation of game results improves the game user experience;
本发明一些实施例提供的区块链游戏的链下随机数应用方法、设备和存储介质进一步通过在本局游戏所有与链下随机数有关的游戏环节结束后再生成并发送随机数碎片,保障了本局游戏的其它用户串通以提前获知链下随机数也无法作弊或影响游戏结果;The off-chain random number application method, device and storage medium for blockchain games provided by some embodiments of the present invention further ensure that random number fragments are generated and sent after all the game links related to off-chain random numbers in the game are over. Other users of this game colluded to get the random number under the chain in advance, and they cannot cheat or affect the result of the game;
本发明一些实施例提供的区块链游戏的链下随机数应用方法、设备和存储介质进一步通过由每一用户端在接收随机数碎片后加密生成碎片加密信息并广播,从而使各用户端可以校验接收的随机数碎片是否正确,进一步完善了链下随机数机制;The off-chain random number application method, device, and storage medium of blockchain games provided by some embodiments of the present invention further encrypt and broadcast the fragment encrypted information after receiving the random number fragment, so that each user terminal can Verify that the received random number fragments are correct, and further improve the off-chain random number mechanism;
本发明一些实施例提供的区块链游戏的链下随机数应用方法、设备和存储介质进一步通过对随机数加密信息、碎片加密信息和随机数进行签名,进一步完善了链下随机数的存证和举证机制。The off-chain random number application method, device, and storage medium of blockchain games provided by some embodiments of the present invention further complete the off-chain random number storage certificate by signing random number encrypted information, fragmented encrypted information and random numbers. And proof mechanism.
附图说明Description of the drawings
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:By reading the detailed description of the non-limiting embodiments with reference to the following drawings, other features, purposes and advantages of the present application will become more apparent:
图1为本发明一实施例提供的一种区块链游戏的链下随机数应用方法的流程图。FIG. 1 is a flowchart of an off-chain random number application method for blockchain games according to an embodiment of the present invention.
图2为图1所示方法的一种优选实施方式中步骤S17的流程图。Fig. 2 is a flowchart of step S17 in a preferred embodiment of the method shown in Fig. 1.
图3为本发明一实施例提供的一种设备的结构示意图。FIG. 3 is a schematic structural diagram of a device provided by an embodiment of the present invention.
具体实施方式Detailed ways
下面结合附图和实施例对本申请作进一步的详细说明。可以理解的是,此处所描述的具体实施例仅仅用于解释相关发明,而非对该发明的限定。另外还需要说明的是,为了便于描述,附图中仅示出了与发明相关的部分。The application will be further described in detail below with reference to the drawings and embodiments. It can be understood that the specific embodiments described here are only used to explain the related invention, but not to limit the invention. In addition, it should be noted that, for ease of description, only the parts related to the invention are shown in the drawings.
需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。下面将参考附图并结合实施例来详细说明本申请。It should be noted that the embodiments in the application and the features in the embodiments can be combined with each other if there is no conflict. Hereinafter, the application will be described in detail with reference to the drawings and in conjunction with the embodiments.
图1为本发明一实施例提供的一种区块链游戏的链下随机数应用方法的流程图。FIG. 1 is a flowchart of an off-chain random number application method for blockchain games according to an embodiment of the present invention.
如图1所示,在本实施例中,本发明提供一种区块链游戏的链下随机数应用方法,该游戏的参与人数为n,n不小于3,该方法适用于用户端,该方法包括:As shown in Figure 1, in this embodiment, the present invention provides an off-chain random number application method for a blockchain game. The number of participants in the game is n, and n is not less than 3. This method is suitable for the user side. Methods include:
S11:生成第一随机数,以及加密第一随机数所生成的第一加密信息,向参与本局游戏的各第二用户端广播第一加密信息;S11: Generate a first random number, and encrypt the first encrypted information generated by encrypting the first random number, and broadcast the first encrypted information to each second user terminal participating in the game;
S13:接收并存储各第二用户端分别广播的第二加密信息;其中,第二加密信息由第二用户端加密相应的第二随机数所生成;S13: Receive and store the second encrypted information respectively broadcasted by each second client; where the second encrypted information is generated by encrypting the corresponding second random number by the second client;
S15:生成n-2个第三随机数,并根据第一随机数和n-2个第三随机数生成第四随机数,将n-2个第三随机数和第四随机数分别发送至n-1个第二用户端,使各第二用户端分别持有一个第三随机数或第四随机数;S15: Generate n-2 third random numbers, generate a fourth random number according to the first random number and n-2 third random numbers, and send n-2 third random numbers and fourth random numbers to n-1 second client terminals, so that each second client terminal holds a third random number or a fourth random number respectively;
S17:接收并存储各第二用户端分别发送的第五随机数或第六随机数;其中,第五随机数由第二用户端生成,第六随机数由第二用户端根据第二随机数和n-2个第五随机数生成;S17: Receive and store the fifth random number or the sixth random number respectively sent by each second user end; wherein, the fifth random number is generated by the second user end, and the sixth random number is generated by the second user end according to the second random number And n-2 fifth random number generation;
S191:监测在生成链下随机数的时段是否收到各第二用户端广播的第二随机数:S191: Monitor whether the second random number broadcast by each second user terminal is received during the period of time when the off-chain random number is generated:
S193:未收到第一第二用户端广播的第二随机数,则广播第一第二用户端所生成的第五随机数或第六随机数;以及,S193: If the second random number broadcast by the first and second client is not received, broadcast the fifth random number or the sixth random number generated by the first and second client; and,
S194:接收除第一第二用户端外的各第二用户端广播的第一第二用户端所生成的第五随机数或第六随机数;S194: Receive the fifth random number or the sixth random number generated by the first and second user terminals broadcast by each second user terminal except the first and second user terminals;
S195:根据第一第二用户端所生成的n-2个第五随机数和第六随机数生成第一第二用户端所生成的第二随机数;S195: Generate a second random number generated by the first and second user end according to the n-2 fifth random numbers and the sixth random number generated by the first and second user end;
S196:根据第一随机数、接收的n-2个第二随机数和生成的1个第二随机数生成链下随机数。S196: Generate an off-chain random number according to the first random number, the received n-2 second random numbers, and the generated 1 second random number.
以下以n=3,用户ABC进行一局三人游戏,游戏结果需要根据多个链下随机数生成为例,对上述方法进行示例性阐述。In the following, taking n=3, user ABC plays a three-person game, and the game result needs to be generated based on multiple off-chain random numbers as an example, the above method is exemplified.
以生成链下随机数r 1为例(生成其它链下随机数与生成r 1相同,不再一一赘述): Take the generation of random numbers under the chain r 1 as an example (generating random numbers under other chains is the same as generating r 1 and will not repeat them one by one):
在步骤S11中,用户A的用户端生成第一随机数r a,将r a与椭圆曲线算法的基点G相乘以对r a进行加密,生成第一加密信息r aG,向用户B和C的用户端广播r aG; In step S11, the UE of user A generates a first random number r a, and the base point G r a multiplying elliptic curve algorithm to encrypt r a, generating a first encrypted information r a G, and B to the user user C's terminal broadcast r a G;
同理,用户B的用户端生成第二随机数r b和第二加密信息r bG,向用户A和C的用户端广播r bG; In the same way, the user terminal of user B generates the second random number r b and the second encrypted information r b G, and broadcasts r b G to the user terminals of users A and C;
用户C的用户端生成第二随机数r c和第二加密信息r cG,向用户A和B的用户端广播r cG; The user terminal of user C generates a second random number r c and second encrypted information r c G, and broadcasts r c G to the user terminals of users A and B;
在步骤S13中,用户A的用户端分别接收并存储r bG和r cG; In step S13, the user terminal of user A receives and stores r b G and r c G respectively;
同理,用户B的用户端分别接收并存储r aG和r cG; In the same way, the user terminal of user B receives and stores r a G and r c G respectively;
用户C的用户端分别接收并存储r aG和r bG; The user terminal of user C receives and stores r a G and r b G respectively;
在步骤S15中,用户A的用户端生成1个第三随机数r a1,以及第四随机数r a2=r a-r a1,将r a1发送给用户B的用户端、将r a2发送给用户C的用户端(也可以将r a2发送给用户B的用户端、将r a1发送给用户C的用户端,即,可随机分配,下同); In step S15, the UE of user A generates a random number r a1 third, and fourth random number r a2 = r a -r a1, r a1 transmits to the user terminal of user B, is sent to the r a2 The user terminal of user C (also can send ra2 to the user terminal of user B, and send ra1 to the user terminal of user C, that is, it can be randomly allocated, the same below);
同理,用户B的用户端生成1个第五随机数r b1和第六随机数r b2=r b-r b1,将r b1发送给用户A的用户端、将r b2发送给用户C的用户端; Similarly, the user end of user B generates a fifth random number r b1 and a sixth random number r b2 =r b -r b1 , and sends r b1 to the user end of user A, and sends r b2 to user C. user terminal;
用户C的用户端生成1个第五随机数r c1和第六随机数r c2=r c-r c1,将r c1发送给用户A的用户端、将r c2发送给用户B的用户端; The user end of user C generates a fifth random number r c1 and a sixth random number r c2 =r c -r c1 , and sends r c1 to the user end of user A, and sends r c2 to the user end of user B;
在步骤S17中,用户A的用户端分别接收并存储r b1和r c1In step S17, the user terminal of user A receives and stores r b1 and r c1 respectively ;
同理,用户B的用户端分别接收并存储r a1和r c2In the same way, the user terminal of user B receives and stores r a1 and r c2 respectively ;
用户C的用户端分别接收并存储r a2和r b2The user terminal of user C receives and stores ra2 and r b2 respectively ;
在步骤S191中,用户A的用户端在生成链下随机数r 1的时段监测是否收到用户B和C的用户端分别广播的第二随机数r b和r cIn step S191, the user terminal of user A monitors whether it receives the second random numbers r b and r c broadcasted by the user terminals of users B and C during the period when the off-chain random number r 1 is generated:
当用户B和C的用户端正常广播r b和r c时,用户A的用户端收到r b和r c,根据步骤S13所存储的存储r bG和r cG分别验证r b和r c是否无误: When the user terminals of users B and C broadcast r b and r c normally, the user terminal of user A receives r b and r c , and verifies r b and r respectively according to the stored r b G and r c G stored in step S13 c is correct:
是,则根据预配置的随机数生成函数f()生成链下随机数r 1=f(r a,r b,r c); If yes, generate an off-chain random number r 1 =f(r a ,r b ,r c ) according to the pre-configured random number generation function f();
当用户B和C的用户端同时掉线,或用户A的用户端掉线时,用户A的用户端未收到r b和r c,通过检测当前用户端的网络连接是否正常、重新发送请求等本领域常用的方式进行处理; When the user terminals of user B and C are offline at the same time, or the user terminal of user A is offline, the user terminal of user A does not receive r b and r c , by checking whether the network connection of the current user terminal is normal, sending the request again Processing methods commonly used in this field;
当用户B的用户端恶意下线或意外离线,用户C的用户端正常广播r c时,用户A的用户端收到r c但未收到r b,则执行步骤S193:用户A的用户端向用户C的用户端广播用户B的用户端生成的第五随机数r b1When the client of user B goes offline maliciously or accidentally offline, and the client of user C broadcasts r c normally, and the client of user A receives r c but not r b , then step S193 is executed: the client of user A Broadcast to the user terminal of user C the fifth random number r b1 generated by the user terminal of user B;
同理,用户C的用户端向用户A的用户端广播用户B的用户端生成的第六随机数r b2 Similarly, the user terminal of user C broadcasts the sixth random number r b2 generated by the user terminal of user B to the user terminal of user A;
在步骤S194中,用户A的用户端接收用户C的用户端广播的r b2In step S194, the user terminal of user A receives r b2 broadcast by the user terminal of user C;
同理,用户C的用户端接收用户A的用户端广播的r b1Similarly, the user terminal of user C receives r b1 broadcast by the user terminal of user A;
在步骤S195中,用户A的用户端根据r b1和r b2生成r b:r b=r b1+r b2In step S195, the user terminal of user A generates r b according to r b1 and r b2 : r b =r b1 +r b2 ;
同理,用户C的用户端根据r b1和r b2生成r bSimilarly, the user terminal of user C generates r b according to r b1 and r b2 ;
在步骤S196中,用户A的用户端在根据r bG和r cG分别验证r b和r c后,根据f()生成链下随机数r 1=f(r a,r b,r c); In step S196, the user terminal of user A, after verifying r b and r c according to r b G and r c G, generates an off-chain random number r 1 =f(r a ,r b ,r c according to f() );
同理,用户C的用户端根据r aG和r bG分别验证r a和r b后,根据f()生成链下随机数r 1=f(r a,r b,r c)。 After Similarly, the client user C respectively and verification r a r a r b The G and r b G, according to f () to generate the random number strand r 1 = f (r a, r b, r c).
上述示例以游戏人数为三人、加密随机数的方式配置为将随机数与椭圆曲线算法的基点G相乘为例对图1所示的方法进行了示例性的阐述,在更多实施例中,图1所示的方法同样适用于四人游戏、五人游戏等不同人数的多人游戏,只要游戏人数不少于3人即可;加密随机数的方式还可以配置为本领域常用的其它无法根据密文逆推明文的 加密算法,可实现相同的技术效果。In the above example, the method shown in FIG. 1 is exemplarily explained by taking the way that the number of players is three and the encrypted random number is configured to multiply the random number by the base point G of the elliptic curve algorithm. In more embodiments , The method shown in Figure 1 is also applicable to multiplayer games with different numbers of people such as four-player games and five-player games, as long as the number of players is not less than 3; the method of encrypting random numbers can also be configured as other commonly used in the field The encryption algorithm of the plaintext cannot be reversed based on the ciphertext, and the same technical effect can be achieved.
上述实施例通过在多人游戏中由每个用户端将自身生成的随机数拆分成多份并分别发送至参与本局游戏的其它用户端,使得在任一用户端超时未公布自身生成的随机数时,其它用户端可以根据各自存储的随机数碎片恢复该超时未公布的随机数,从而生成链下随机数,保障游戏结果的生成,提升了游戏用户体验。In the above embodiment, in a multiplayer game, each client splits the random number generated by itself into multiple copies and sends them to other client terminals participating in the game, so that the random number generated by itself is not published on any client side over time. At the time, other users can restore the random number that has not been announced after the timeout according to their stored random number fragments, thereby generating an off-chain random number, ensuring the generation of game results, and improving the game user experience.
在一优选实施例中,步骤S15包括:In a preferred embodiment, step S15 includes:
在本局游戏中所有与链下随机数有关的游戏环节结束后,生成n-2个第三随机数,并根据第一随机数和n-2个第三随机数生成第四随机数,将n-2个第三随机数和第四随机数分别发送至n-1个第二用户端,使各第二用户端分别持有一个第三随机数或第四随机数。After all the game links related to random numbers off the chain in this game are over, n-2 third random numbers are generated, and the fourth random number is generated according to the first random number and n-2 third random numbers, and n -2 third random numbers and fourth random numbers are respectively sent to n-1 second client terminals, so that each second client terminal holds a third random number or a fourth random number respectively.
具体地,图1所示的方法虽然保障了链下随机数的生成,但却引发了新的安全隐患。例如,在上述用户ABC进行的三人游戏中,若用户A的用户端在与r 1相关的游戏环节未结束前就将r a1发送给用户B的用户端、将r a2发送给用户C的用户端,存在用户B和C串通即可提前生成r 1,从而在游戏环节中进行作弊的安全隐患。更糟糕的是,该机制可能会使用户产生“如果我不去串通作弊,其它人串通作弊了我会受害”的心理博弈,从而诱导部分用户试图进行串通作弊。 Specifically, although the method shown in Figure 1 guarantees the generation of off-chain random numbers, it causes new security risks. For example, in the above-described three game user ABC conducted, if the user of the user terminal A before a game session associated with r r UE will not end a1 sent to user B, user C sent to r A2 On the user side, there is a security risk that users B and C can collude to generate r 1 in advance, thereby cheating in the game. Worse, this mechanism may cause users to have a psychological game of "if I don't collude to cheat, I will suffer if others collude and cheat", thereby inducing some users to try to collude and cheat.
针对上述安全隐患,通过将步骤S15配置为,在本局游戏中所有与链下随机数有关的游戏环节结束后再执行,使得串通的用户即便提前生成了r 1,也无法进行作弊获利,而只能提前获知游戏结果。 In view of the aforementioned security risks, step S15 is configured to be executed after all game links related to off-chain random numbers in the game are over, so that even if the colluding users generate r 1 in advance, they cannot cheat and gain profit. The result of the game can only be known in advance.
上述实施例进一步通过在本局游戏所有与链下随机数有关的游戏环节结束后再生成并发送随机数碎片,保障了本局游戏的其它用户串通以提前获知链下随机数也无法作弊或影响游戏结果。The above embodiment further generates and sends random number fragments after all the game links related to the off-chain random number of the game in this game are over, which ensures that other users of the game of this game collude to learn the off-chain random number in advance and cannot cheat or affect the game result. .
图2为图1所示方法的一种优选实施方式中步骤S17的流程图。Fig. 2 is a flowchart of step S17 in a preferred embodiment of the method shown in Fig. 1.
如图2所示,在一优选实施例中,步骤S17包括:As shown in Figure 2, in a preferred embodiment, step S17 includes:
S171:接收第二第二用户端发送的第五随机数或第六随机数;S171: Receive the fifth random number or the sixth random number sent by the second user end;
S173:加密第五随机数或第六随机数以生成第三加密信息,向除第二第二用户端外的各第二用户端广播第三加密信息;S173: Encrypt the fifth random number or the sixth random number to generate third encrypted information, and broadcast the third encrypted information to each second user end except the second second user end;
S175:接收除第二第二用户端外的各第二用户端分别广播的第四 加密信息;其中,第四加密信息由第二用户端加密第二第二用户端发送的第五随机数或第六随机数所生成;S175: Receive the fourth encrypted information respectively broadcasted by each second user end except the second second user end; wherein the fourth encrypted information is encrypted by the second user end and the fifth random number sent by the second second user end or The sixth random number is generated;
S177:根据第二第二用户端广播的第二加密信息校验第三加密信息和各第四加密信息:S177: Verify the third encrypted information and each fourth encrypted information according to the second encrypted information broadcast by the second second client:
校验成功,则执行步骤S179:存储第二第二用户端发送的第五随机数或第六随机数。If the verification is successful, step S179 is executed: the fifth random number or the sixth random number sent by the second second user terminal is stored.
具体地,同样以用户ABC进行三人游戏为例:Specifically, also take user ABC playing a three-person game as an example:
在步骤S171中,用户A的用户端接收r b1和r c1(用户B和C的用户端同理,不再一一列举,下同); In step S171, the user terminal of user A receives r b1 and r c1 (the same is true for the user terminals of users B and C, which will not be listed one by one, the same below);
在步骤S173中,用户A的用户端对r b1进行加密以生成r b1G,将r b1G广播给用户C的用户端;对r c1进行加密以生成r c1G,将r c1G广播给用户B的用户端; In step S173, the UE of user A to r b1 encrypted to generate r b1 G, the r b1 G broadcast to the UE user C; of r c1 encrypted to generate r c1 G, the r c1 G broadcast to User B's client;
在步骤S175中,用户A的用户端分别接收用户C的用户端所广播的r b2G和用户B的用户端所广播的r c2G; In step S175, the user terminal of user A respectively receives r b2 G broadcast by the user terminal of user C and r c2 G broadcast by the user terminal of user B;
在步骤S177中,用户A的用户端分别校验r b1G+r b2G是否与步骤S13所接收并存储的r bG相同,以及,r c1G+r c2G是否与r cG相同: In step S177, the user terminal of user A respectively checks whether r b1 G+r b2 G is the same as r b G received and stored in step S13 , and whether r c1 G+r c2 G is the same as r c G:
校验成功,则执行步骤S179,存储r b1和r c1If the verification is successful, step S179 is executed to store r b1 and r c1 ;
校验失败,则可以向相应的用户端重新请求未通过校验的r b1和/或r c1,或,向相应的用户端发送报错信息,还可以存证以备举证。 If the verification fails, you can re-request the r b1 and/or r c1 that failed the verification from the corresponding client, or send an error message to the corresponding client, and you can also save the proof for proof.
上述实施例进一步通过由每一用户端在接收随机数碎片后加密生成碎片加密信息并广播,从而使各用户端可以校验接收的随机数碎片是否正确,进一步完善了链下随机数机制。In the above embodiment, after receiving the random number fragments, each user terminal encrypts the generated fragment encrypted information and broadcasts it, so that each user terminal can verify whether the received random number fragment is correct, and further improve the off-chain random number mechanism.
在一优选实施例中,上述实施例中所广播的第一加密信息、各第三随机数和第四随机数经过当前用户签名,所接收的第二加密信息、第五随机数或第六随机数经过相应的用户签名。In a preferred embodiment, the first encrypted information, each third random number, and the fourth random number broadcast in the foregoing embodiment are signed by the current user, and the received second encrypted information, fifth random number or sixth random number The number is signed by the corresponding user.
具体地,上述实施例提供的方法中仍存在某些用户恶意广播错误数据的可能性,通过签名可以使各用户对所接收的签名的数据进行存证以备举证。Specifically, in the method provided in the foregoing embodiment, there is still the possibility that some users maliciously broadcast wrong data, and each user can record the received signed data for proof by signing.
上述实施例进一步通过对随机数加密信息、碎片加密信息和随机数进行签名,进一步完善了链下随机数的存证和举证机制。The foregoing embodiment further improves the off-chain random number storage and proof mechanism by signing the random number encrypted information, fragmented encrypted information, and random number.
图3为本发明一实施例提供的一种设备的结构示意图。FIG. 3 is a schematic structural diagram of a device provided by an embodiment of the present invention.
如图3所示,作为另一方面,本申请还提供了一种设备300,包括一个或多个中央处理单元(CPU)301,其可以根据存储在只读存储器(ROM)302中的程序或者从存储部分308加载到随机访问存储器(RAM)303中的程序而执行各种适当的动作和处理。在RAM303中,还存储有设备300操作所需的各种程序和数据。CPU301、ROM302以及RAM303通过总线304彼此相连。输入/输出(I/O)接口305也连接至总线304。As shown in FIG. 3, as another aspect, the present application also provides a device 300, including one or more central processing units (CPU) 301, which can be based on a program stored in a read-only memory (ROM) 302 or The program loaded from the storage section 308 into the random access memory (RAM) 303 executes various appropriate actions and processing. In the RAM 303, various programs and data required for the operation of the device 300 are also stored. The CPU301, the ROM302, and the RAM303 are connected to each other through a bus 304. An input/output (I/O) interface 305 is also connected to the bus 304.
以下部件连接至I/O接口305:包括键盘、鼠标等的输入部分306;包括诸如阴极射线管(CRT)、液晶显示器(LCD)等以及扬声器等的输出部分307;包括硬盘等的存储部分308;以及包括诸如LAN卡、调制解调器等的网络接口卡的通信部分309。通信部分309经由诸如因特网的网络执行通信处理。驱动器310也根据需要连接至I/O接口305。可拆卸介质311,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器310上,以便于从其上读出的计算机程序根据需要被安装入存储部分308。The following components are connected to the I/O interface 305: an input part 306 including a keyboard, a mouse, etc.; an output part 307 including a cathode ray tube (CRT), a liquid crystal display (LCD), etc., and speakers, etc.; a storage part 308 including a hard disk, etc. ; And a communication section 309 including a network interface card such as a LAN card, a modem, and the like. The communication section 309 performs communication processing via a network such as the Internet. The driver 310 is also connected to the I/O interface 305 as needed. A removable medium 311, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 310 as needed, so that the computer program read from it is installed into the storage portion 308 as needed.
特别地,根据本公开的实施例,上述任一实施例描述的方法可以被实现为计算机软件程序。例如,本公开的实施例包括一种计算机程序产品,其包括有形地包含在机器可读介质上的计算机程序,计算机程序包含用于执行上述任一方法的程序代码。在这样的实施例中,该计算机程序可以通过通信部分309从网络上被下载和安装,和/或从可拆卸介质311被安装。In particular, according to the embodiments of the present disclosure, the method described in any of the above embodiments may be implemented as a computer software program. For example, an embodiment of the present disclosure includes a computer program product, which includes a computer program tangibly embodied on a machine-readable medium, and the computer program includes program code for executing any of the foregoing methods. In such an embodiment, the computer program may be downloaded and installed from the network through the communication part 309, and/or installed from the removable medium 311.
作为又一方面,本申请还提供了一种计算机可读存储介质,该计算机可读存储介质可以是上述实施例的装置中所包含的计算机可读存储介质;也可以是单独存在,未装配入设备中的计算机可读存储介质。计算机可读存储介质存储有一个或者一个以上程序,该程序被一个或者一个以上的处理器用来执行描述于本申请提供的方法。As yet another aspect, the present application also provides a computer-readable storage medium. The computer-readable storage medium may be the computer-readable storage medium included in the device of the above-mentioned embodiment; The computer-readable storage medium in the device. The computer-readable storage medium stores one or more programs, and the programs are used by one or more processors to execute the methods described in this application.
附图中的流程图和框图,图示了按照本发明各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码 的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这根据所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以通过执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以通过专用硬件与计算机指令的组合来实现。The flowcharts and block diagrams in the drawings illustrate the possible implementation architecture, functions, and operations of the system, method, and computer program product according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagram may represent a module, program segment, or part of code, and the module, program segment, or part of code contains one or more for realizing the specified logical function Executable instructions. It should also be noted that, in some alternative implementations, the functions marked in the block may also occur in a different order from the order marked in the drawings. For example, two blocks shown one after the other may actually be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending on the functions involved. It should also be noted that each block in the block diagram and/or flowchart, and the combination of the blocks in the block diagram and/or flowchart, can be implemented by a dedicated hardware-based system that performs the specified functions or operations Or it can be realized by a combination of dedicated hardware and computer instructions.
描述于本申请实施例中所涉及到的单元或模块可以通过软件的方式实现,也可以通过硬件的方式来实现。所描述的单元或模块也可以设置在处理器中,例如,各单元可以是设置在计算机或移动智能设备中的软件程序,也可以是单独配置的硬件装置。其中,这些单元或模块的名称在某种情况下并不构成对该单元或模块本身的限定。The units or modules involved in the embodiments described in the present application can be implemented in software or hardware. The described units or modules may also be arranged in the processor. For example, each unit may be a software program arranged in a computer or a mobile smart device, or may be a separately configured hardware device. Among them, the names of these units or modules do not constitute a limitation on the units or modules themselves under certain circumstances.
以上描述仅为本申请的较佳实施例以及对所运用技术原理的说明。本领域技术人员应当理解,本申请中所涉及的发明范围,并不限于上述技术特征的特定组合而成的技术方案,同时也应涵盖在不脱离本申请构思的情况下,由上述技术特征或其等同特征进行任意组合而形成的其它技术方案。例如上述特征与本申请中公开的(但不限于)具有类似功能的技术特征进行互相替换而形成的技术方案。The above description is only a preferred embodiment of the present application and an explanation of the applied technical principles. Those skilled in the art should understand that the scope of the invention involved in this application is not limited to the technical solutions formed by the specific combination of the above technical features, and should also cover the above technical features or technical solutions without departing from the concept of the application. Other technical solutions formed by arbitrarily combining the equivalent features. For example, the above-mentioned features and the technical features disclosed in this application (but not limited to) with similar functions are mutually replaced to form a technical solution.

Claims (7)

  1. 一种区块链游戏的链下随机数应用方法,其特征在于,所述游戏的参与人数为n,n不小于3,所述方法适用于用户端,所述方法包括:An off-chain random number application method for a blockchain game is characterized in that the number of participants in the game is n, and n is not less than 3. The method is suitable for the user side, and the method includes:
    生成第一随机数,以及加密所述第一随机数所生成的第一加密信息,向参与本局游戏的各第二用户端广播所述第一加密信息;Generating a first random number, and encrypting the first encrypted information generated by encrypting the first random number, and broadcasting the first encrypted information to each second user terminal participating in the game;
    接收并存储各所述第二用户端分别广播的第二加密信息;其中,所述第二加密信息由所述第二用户端加密相应的第二随机数所生成;Receiving and storing the second encrypted information respectively broadcasted by each of the second client terminals; wherein the second encrypted information is generated by encrypting the corresponding second random number by the second client terminal;
    生成n-2个第三随机数,并根据所述第一随机数和所述n-2个第三随机数生成第四随机数,将n-2个所述第三随机数和所述第四随机数分别发送至n-1个所述第二用户端,使各所述第二用户端分别持有一个第三随机数或第四随机数;Generate n-2 third random numbers, and generate a fourth random number according to the first random number and the n-2 third random numbers, and combine the n-2 third random numbers with the first random number Four random numbers are respectively sent to n-1 said second client terminals, so that each of said second client terminals holds a third random number or a fourth random number respectively;
    接收并存储各所述第二用户端分别发送的第五随机数或第六随机数;其中,所述第五随机数由所述第二用户端生成,所述第六随机数由所述第二用户端根据所述第二随机数和n-2个第五随机数生成;Receive and store the fifth random number or the sixth random number sent by each of the second client terminals; wherein the fifth random number is generated by the second client terminal, and the sixth random number is generated by the first client terminal. 2. The user terminal generates according to the second random number and n-2 fifth random numbers;
    监测在生成链下随机数的时段是否收到各所述第二用户端广播的第二随机数:Monitoring whether the second random number broadcast by each of the second user terminals is received during the period of generating the random number under the chain:
    未收到第一第二用户端广播的第二随机数,则广播所述第一第二用户端所生成的第五随机数或第六随机数;以及,If the second random number broadcast by the first and second client is not received, broadcast the fifth random number or the sixth random number generated by the first and second client; and,
    接收除所述第一第二用户端外的各所述第二用户端广播的所述第一第二用户端所生成的第五随机数或第六随机数;Receiving a fifth random number or a sixth random number generated by the first and second user terminals broadcast by each of the second user terminals except the first and second user terminals;
    根据所述第一第二用户端所生成的n-2个第五随机数和第六随机数生成所述第一第二用户端所生成的第二随机数;Generating the second random number generated by the first and second user end according to the n-2 fifth random numbers and the sixth random number generated by the first and second user end;
    根据所述第一随机数、接收的n-2个第二随机数和生成的1个第二随机数生成链下随机数。An off-chain random number is generated according to the first random number, the received n-2 second random numbers, and the generated 1 second random number.
  2. 根据权利要求1所述的方法,其特征在于,所述生成n-2个第三随机数,并根据所述第一随机数和所述n-2个第三随机数生成第四随机数,将n-2个所述第三随机数和所述第四随机数分别发送至n-1 个所述第二用户端,使各所述第二用户端分别持有一个第三随机数或第四随机数包括:The method according to claim 1, wherein the generating n-2 third random numbers, and generating a fourth random number according to the first random number and the n-2 third random numbers, The n-2 third random numbers and the fourth random numbers are respectively sent to n-1 second client terminals, so that each of the second client terminals holds a third random number or a third random number. Four random numbers include:
    在本局游戏中所有与所述链下随机数有关的游戏环节结束后,生成n-2个第三随机数,并根据所述第一随机数和所述n-2个第三随机数生成第四随机数,将n-2个所述第三随机数和所述第四随机数分别发送至n-1个所述第二用户端,使各所述第二用户端分别持有一个第三随机数或第四随机数。After all the game links related to the off-chain random number in this game are over, n-2 third random numbers are generated, and the first random number is generated according to the first random number and the n-2 third random number. Four random numbers, sending n-2 of the third random number and the fourth random number to n-1 of the second client terminals respectively, so that each of the second client terminals holds a third Random number or fourth random number.
  3. 根据权利要求1或2所述的方法,其特征在于,所述接收并存储各所述第二用户端分别发送的第五随机数或第六随机数包括:The method according to claim 1 or 2, wherein the receiving and storing the fifth random number or the sixth random number respectively sent by each of the second user terminals comprises:
    接收第二第二用户端发送的第五随机数或第六随机数;Receiving the fifth random number or the sixth random number sent by the second second user terminal;
    加密所述第五随机数或第六随机数以生成第三加密信息,向除所述第二第二用户端外的各所述第二用户端广播所述第三加密信息;Encrypting the fifth random number or the sixth random number to generate third encrypted information, and broadcasting the third encrypted information to each of the second client terminals except the second second client terminal;
    接收除所述第二第二用户端外的各所述第二用户端分别广播的第四加密信息;其中,所述第四加密信息由所述第二用户端加密第二第二用户端发送的第五随机数或第六随机数所生成;Receiving fourth encrypted information broadcasted by each of the second client terminals except the second second client terminal; wherein the fourth encrypted information is sent by the second client terminal encrypted by the second client terminal Generated by the fifth random number or the sixth random number;
    根据所述第二第二用户端广播的第二加密信息校验所述第三加密信息和各所述第四加密信息:校验成功,则存储所述第二第二用户端发送的第五随机数或第六随机数。Verify the third encrypted information and each of the fourth encrypted information according to the second encrypted information broadcast by the second second client: if the verification is successful, the fifth sent by the second second client is stored Random number or sixth random number.
  4. 根据权利要求3所述的方法,其特征在于,各用户端加密随机数的方式均配置为将随机数与椭圆曲线算法的基点G相乘。The method according to claim 3, wherein each user terminal encrypts the random number in a manner configured to multiply the random number by the base point G of the elliptic curve algorithm.
  5. 根据权利要求1或2所述的方法,其特征在于,所广播的第一加密信息、各第三随机数和第四随机数经过当前用户签名,所接收的第二加密信息、第五随机数或第六随机数经过相应的用户签名。The method according to claim 1 or 2, wherein the broadcasted first encrypted information, each third random number and the fourth random number are signed by the current user, and the received second encrypted information and fifth random number Or the sixth random number is signed by the corresponding user.
  6. 一种设备,其特征在于,所述设备包括:A device, characterized in that the device includes:
    一个或多个处理器;One or more processors;
    存储器,用于存储一个或多个程序,Memory, used to store one or more programs,
    当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行如权利要求1-5中任一项所述的方法。When the one or more programs are executed by the one or more processors, the one or more processors are caused to execute the method according to any one of claims 1-5.
  7. 一种存储有计算机程序的存储介质,其特征在于,该程序被处理器执行时实现如权利要求1-5中任一项所述的方法。A storage medium storing a computer program, characterized in that, when the program is executed by a processor, the method according to any one of claims 1-5 is implemented.
PCT/CN2020/134727 2019-12-13 2020-12-09 Off-chain random number application method and device for blockchain game, and storage medium WO2021115290A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911284231.9 2019-12-13
CN201911284231.9A CN111185011B (en) 2019-12-13 2019-12-13 Method, apparatus and storage medium for applying random number under block chain game

Publications (1)

Publication Number Publication Date
WO2021115290A1 true WO2021115290A1 (en) 2021-06-17

Family

ID=70684433

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/134727 WO2021115290A1 (en) 2019-12-13 2020-12-09 Off-chain random number application method and device for blockchain game, and storage medium

Country Status (2)

Country Link
CN (1) CN111185011B (en)
WO (1) WO2021115290A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111185011B (en) * 2019-12-13 2023-04-18 杭州复杂美科技有限公司 Method, apparatus and storage medium for applying random number under block chain game
TW202244763A (en) * 2021-02-07 2022-11-16 全馨資訊有限公司 Method and computing apparatus related to proof-of-work of blockchain mining

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160285629A1 (en) * 2015-03-24 2016-09-29 Kabushiki Kaisha Toshiba Quantum key distribution device, quantum key distribution system, and quantum key distribution method
CN109126139A (en) * 2018-08-31 2019-01-04 杭州复杂美科技有限公司 A kind of guessing game processing method, equipment and storage medium
CN109558112A (en) * 2018-11-14 2019-04-02 杭州复杂美科技有限公司 Random digit generation method, anti-cheating block catenary system, equipment and storage medium
CN110365479A (en) * 2019-07-11 2019-10-22 湖南天河国云科技有限公司 Random digit generation method and device based on block chain
CN111185011A (en) * 2019-12-13 2020-05-22 杭州复杂美科技有限公司 Method, apparatus and storage medium for applying random number under block chain game

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030054879A1 (en) * 1996-12-31 2003-03-20 Bruce Schneier System and method for securing electronic games
CN109345244A (en) * 2018-09-25 2019-02-15 杭州复杂美科技有限公司 A kind of picture quiz game method, equipment and storage medium
CN110180188B (en) * 2019-05-22 2022-06-28 杭州复杂美科技有限公司 Card dealing method, game method, device and storage medium
CN110430045B (en) * 2019-07-17 2021-10-01 上海朝夕网络技术有限公司 Random number generation method based on distributed consensus algorithm

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160285629A1 (en) * 2015-03-24 2016-09-29 Kabushiki Kaisha Toshiba Quantum key distribution device, quantum key distribution system, and quantum key distribution method
CN109126139A (en) * 2018-08-31 2019-01-04 杭州复杂美科技有限公司 A kind of guessing game processing method, equipment and storage medium
CN109558112A (en) * 2018-11-14 2019-04-02 杭州复杂美科技有限公司 Random digit generation method, anti-cheating block catenary system, equipment and storage medium
CN110365479A (en) * 2019-07-11 2019-10-22 湖南天河国云科技有限公司 Random digit generation method and device based on block chain
CN111185011A (en) * 2019-12-13 2020-05-22 杭州复杂美科技有限公司 Method, apparatus and storage medium for applying random number under block chain game

Also Published As

Publication number Publication date
CN111185011A (en) 2020-05-22
CN111185011B (en) 2023-04-18

Similar Documents

Publication Publication Date Title
CN113424185B (en) Fast inadvertent transmission
US10122710B2 (en) Binding a data transaction to a person's identity using biometrics
CN110213059B (en) Random number generation method, random number generation device and storage medium
EP1372292B1 (en) Secure key exchange with mutual authentication
WO2021115290A1 (en) Off-chain random number application method and device for blockchain game, and storage medium
CN110380852A (en) Mutual authentication method and communication system
US20030093669A1 (en) Network architecture for secure communications between two console-based gaming systems
US11245531B2 (en) Method, apparatus and system for establishing biometric identification information transmission and storage medium
CN112968884B (en) Block chain heterogeneous consensus method and terminal for preventing hacker attack
US9276735B2 (en) Information processing apparatus, signature generation apparatus, information processing method, signature generation method, and program
EP3496331A1 (en) Two-party signature device and method
WO2017221723A1 (en) Terminal device, key distribution management device, server-client system, communication method, and program
CN114154196A (en) Heterogeneous data processing method and device and electronic equipment
Alwen et al. Collusion-free multiparty computation in the mediated model
Liu et al. Provably secure three-party password-based authenticated key exchange from RLWE
WO2020233377A1 (en) Dealing method, game method, device, and storage medium
Kalai et al. Network extractor protocols
CN112600667A (en) Key negotiation method, device, equipment and storage medium
US20070050841A1 (en) Apparatus and method for authenticating computed results in a public distributed computing environment
Fitzi et al. Multi-party computation with hybrid security
CN116132012A (en) Trusted privacy data comparison method, storage device and intelligent terminal thereof
Hu et al. Universally composable three‐party password‐authenticated key exchange with contributiveness
CN110572257B (en) Identity-based data source identification method and system
JP6893919B2 (en) Entity identity validity verification method and equipment in which multi-TTP participates
CN107113305A (en) Apparatus and method for sending and verifying signature

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20898473

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20898473

Country of ref document: EP

Kind code of ref document: A1