A Tight Lower Bound on Adaptively Secure Full-Information Coin Flip

被引:7
|
作者
Haitner, Iftach [1 ]
Karidi-Heller, Yonatan [1 ]
机构
[1] Tel Aviv Univ, Sch Comp Sci, Tel Aviv, Israel
基金
以色列科学基金会; 欧洲研究理事会;
关键词
adaptive adversaries; coin flipping; lower bound; LEADER ELECTION;
D O I
10.1109/FOCS46700.2020.00120
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a distributed coin-flipping protocol, Blum [ACM Transactions on Computer Systems '83], the parties try to output a common (close to) uniform bit, even when some adversarially chosen parties try to bias the common output. In an adaptively secure full-information coin flip, Ben-Or and Linial [FOCS '85], the parties communicate over a broadcast channel and a computationally unbounded adversary can choose which parties to corrupt along the protocol execution. Ben-Or and Linial proved that the n-party majority protocol is resilient to O(root n) corruptions (ignoring poly-logarithmic factors), and conjectured this is a tight upper bound for any n-party protocol (of any round complexity). Their conjecture was proved to be correct for single-turn (each party sends a single message) single-bit (a message is one bit) protocols Lichtenstein, Linial, and Saks [Combinatorica '89], symmetric protocols Goldwasser, Tauman Kalai, and Park [ICALP '15], and recently for (arbitrary message length) single-turn protocols Tauman Kalai, Komargodski, and Raz [DISC '18]. Yet, the question for many-turn protocols was left completely open. In this work we close the above gap, proving that no n-party protocol (of any round complexity) is resilient to omega(root n) (adaptive) corruptions.
引用
收藏
页码:1268 / 1276
页数:9
相关论文
共 6 条
  • [1] A Lower Bound for Adaptively-Secure Collective Coin Flipping Protocols
    Kalai, Yael Tauman
    Komargodski, Ilan
    Raz, Ran
    [J]. COMBINATORICA, 2021, 41 (01) : 75 - 98
  • [2] A Lower Bound for Adaptively-Secure Collective Coin Flipping Protocols
    Yael Tauman Kalai
    Ilan Komargodski
    Ran Raz
    [J]. Combinatorica, 2021, 41 : 75 - 98
  • [3] Explicit and Nearly Tight Lower Bound for 2-Party Perfectly Secure FSS
    Hiwatashi, Keitaro
    Nuida, Koji
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 541 - 554
  • [4] A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
    Dziembowski, Stefan
    [J]. INFORMATION THEORETIC SECURITY, 2010, 5973 : 19 - 26
  • [5] End-to-End Performance Analysis of Full-Duplex AF-UAV Relay Networks: Tight-Lower Bound ASER
    Jebur, Bilal A.
    Awny, Safaa N.
    Alkassar, Sinan H.
    Tsimenidis, Charalampos C.
    [J]. 2020 IEEE 31ST ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (IEEE PIMRC), 2020,
  • [6] Tight lower bound for average number of terms in optimal double-base number system using information-theoretic tools
    Suppakitpaisarn, Vorapong
    [J]. INFORMATION PROCESSING LETTERS, 2022, 175