Affiliation:
1. University of California at Berkeley
Abstract
Alice and Bob want to flip a coin by telephone. (They have just divorced, live in different cities, want to decide who gets the car.) Bob would not like to tell Alice HEADS and hear Alice (at the other end of the line) say "Here goes . . . I'm flipping the coin. . . . You lost!"Coin-flipping in the SPECIAL way done here has a serious purpose. Indeed, it should prove an INDISPENSABLE TOOL of the protocol designer. Whenever a protocol requires one of two adversaries, say Alice, to pick a sequence of bits at random, and whenever it serves Alice's interests best NOT to pick her sequence of bits at random, then coin-flipping (Bob flipping coins to Alice) as defined here achieves the desired goal:1. It GUARANTEES to Bob that Alice will pick her sequence of bits at random. Her bit is 1 if Bob flips heads to her, O otherwise.2. It GUARANTEES to Alice that Bob will not know WHAT sequence of bits he flipped to her.Coin-flipping has already proved useful in solving a number of problems once thought impossible: mental poker, certified mail, and exchange of secrets. It will certainly prove a useful tool in solving other problems as well.
Publisher
Association for Computing Machinery (ACM)
Reference13 articles.
1. {A'78} D. Angluin "The Complexity of Some Problems in Number Theory " Lecture Notes available from author Dept. of Comp. Science Yale U. (1978). {A'78} D. Angluin "The Complexity of Some Problems in Number Theory " Lecture Notes available from author Dept. of Comp. Science Yale U. (1978).
2. {B'81} M. Blum "How to Exchange (Secret) Keys " to appear. {B'81} M. Blum "How to Exchange (Secret) Keys " to appear.
3. {BM'81} M. Blum and S. Micali "Coin-Flipping into a Well " to appear. {BM'81} M. Blum and S. Micali "Coin-Flipping into a Well " to appear.
4. {BR'81} M. Blum and M. O. Rabin "Mail Certification by Randomization " to appear. {BR'81} M. Blum and M. O. Rabin "Mail Certification by Randomization " to appear.
5. Privacy and authentication: An introduction to cryptography
Cited by
185 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献