A Lower Bound for Adaptively-Secure Collective Coin Flipping Protocols

被引:0
|
作者
Yael Tauman Kalai
Ilan Komargodski
Ran Raz
机构
[1] Microsoft Research,Department of Computer Science
[2] NTT Research and Hebrew University of Jerusalem,undefined
[3] Princeton University,undefined
来源
Combinatorica | 2021年 / 41卷
关键词
68Q01; 68Q17; 68Q25;
D O I
暂无
中图分类号
学科分类号
摘要
In 1985, Ben-Or and Linial (Advances in Computing Research 1989) introduced the collective coin flipping problem, where n parties communicate via a single broadcast channel and wish to generate a common random bit in the presence of adaptive Byzantine corruptions. In this model, the adversary can decide to corrupt a party in the course of the protocol as a function of the messages seen so far. They showed that the majority protocol, in which each player sends a random bit and the output is the majority value, tolerates O(√n) adaptive corruptions. They conjectured that this is optimal for such adversaries.
引用
收藏
页码:75 / 98
页数:23
相关论文
共 50 条
  • [21] Fully Simulatable Quantum-Secure Coin-Flipping and Applications
    Lunemann, Carolin
    Nielsen, Jesper Buus
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011, 2011, 6737 : 21 - 40
  • [22] Lower bounds for distributed coin-flipping and randomized consensus
    Aspnes, J
    [J]. JOURNAL OF THE ACM, 1998, 45 (03) : 415 - 450
  • [23] Simple, Black-Box Constructions of Adaptively Secure Protocols
    Choi, Seung Geol
    Dachman-Soled, Dana
    Malkin, Tal
    Wee, Hoeteck
    [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 387 - +
  • [24] Computational Hardness of Collective Coin-Tossing Protocols
    Maji, Hemanta K.
    [J]. ENTROPY, 2021, 23 (01) : 1 - 23
  • [25] Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares
    Libert, Benoit
    Joye, Marc
    Yung, Moti
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 645 : 1 - 24
  • [26] Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold Signatures with Short Shares
    Libert, Benoit
    Joye, Marc
    Yung, Moti
    [J]. PROCEEDINGS OF THE 2014 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'14), 2014, : 303 - 312
  • [27] Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
    Choi, Seung Geol
    Dachman-Soled, Dana
    Malkin, Tal
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 287 - +
  • [28] Unconditionally secure relativistic multi-party biased coin flipping and die rolling
    Pitalua-Garcia, Damian
    [J]. PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2021, 477 (2252):
  • [29] Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
    Hazay, Carmit
    Polychroniadou, Antigoni
    Venkitasubramaniam, Muthuramakrishnan
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 428 - 460
  • [30] Adaptively and Unconditionally Secure Conversion Protocols between Ramp and Linear Secret Sharing
    Kikuchi, Ryo
    Ikarashi, Dai
    Hamada, Koki
    Chida, Koji
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01): : 223 - 231