On the Black-Box Complexity of Optimally-Fair Coin Tossing

被引:0
|
作者
Dachman-Soled, Dana [1 ]
Lindell, Yehuda [2 ]
Mahmoody, Mohammad [3 ]
Malkin, Tal [1 ]
机构
[1] Columbia Univ, New York, NY 10027 USA
[2] Bar Ilan Univ, IL-52100 Ramat Gan, Israel
[3] Cornell Univ, Ithaca, NY 14853 USA
来源
THEORY OF CRYPTOGRAPHY | 2011年 / 6597卷
关键词
black-box separations; coin tossing; optimally-fair coin tossing; round-complexity; lower-bound;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A fair two-party coin tossing protocol is one in which both parties output the same bit that is almost uniformly distributed (i.e., it equals 0 and 1 with probability that is at most negligibly far from one half). It is well known that it is impossible to achieve fair coin tossing even in the presence of fail-stop adversaries (Cleve, FOCS 1986). In fact, Cleve showed that for every coin tossing protocol running for r rounds, an efficient fail-stop adversary can bias the output by Omega(1/r). Since this is the best possible, a protocol that limits the bias of any adversary to O(1/r) is called optimally-fair. The only optimally-fair protocol that is known to exist relies on the existence of oblivious transfer, because it uses general secure computation (Moran, Naor and Segev, TCC 2009). However, it is possible to achieve a bias of O(1/root r) in r rounds relying only on the assumption that there exist one-way functions. In this paper we show that it is impossible to achieve optimally-fair coin tossing via a black-box construction from one-way functions for r that is less than O(n/ log n), where n is the input/output length of the one-way function used. An important corollary of this is that it is impossible to construct an optimally-fair coin tossing protocol via a black-box construction from one-way functions whose round complexity is independent of the security parameter n determining the security of the one-way function being used. Informally speaking, the main ingredient of our proof is to eliminate the random-oracle from "secure" protocols with "low round-complexity" and simulate the protocol securely against semi-honest adversaries in the plain model. We believe our simulation lemma to be of broader interest.
引用
收藏
页码:450 / +
页数:3
相关论文
共 50 条
  • [21] The black-box complexity of nearest neighbor search
    Krauthgamer, R
    Lee, JR
    AUTOMATA , LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2004, 3142 : 858 - 869
  • [22] The Unrestricted Black-Box Complexity of Jump Functions
    Buzdalov, Maxim
    Doerr, Benjamin
    Kever, Mikhail
    EVOLUTIONARY COMPUTATION, 2016, 24 (04) : 719 - 744
  • [23] On the Black-Box Complexity of Sperner's Lemma
    Friedl, Katalin
    Ivanyos, Gabor
    Santha, Miklos
    Verhoeven, Yves F.
    THEORY OF COMPUTING SYSTEMS, 2009, 45 (03) : 629 - 646
  • [24] The Complexity of Black-Box Mechanism Design with Priors
    Gergatsouli, Evangelia
    Lucier, Brendan
    Tzamos, Christos
    ACM TRANSACTIONS ON ECONOMICS AND COMPUTATION, 2020, 8 (04)
  • [25] Ranking-Based Black-Box Complexity
    Doerr, Benjamin
    Winzen, Carola
    ALGORITHMICA, 2014, 68 (03) : 571 - 609
  • [26] Ranking-Based Black-Box Complexity
    Benjamin Doerr
    Carola Winzen
    Algorithmica, 2014, 68 : 571 - 609
  • [27] On the black-box complexity of Sperner's lemma
    Friedl, K
    Ivanyos, G
    Santha, M
    Verhoeven, YF
    FUNDAMENTALS OF COMPUTATIONAL THEORY, PROCEEDINGS, 2005, 3623 : 245 - 257
  • [28] Reducing the Arity in Unbiased Black-Box Complexity
    Doerr, Benjamin
    Winzen, Carola
    PROCEEDINGS OF THE FOURTEENTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2012, : 1309 - 1316
  • [29] Black-box complexity: Advantages of memory usage
    Storch, Tobias
    INFORMATION PROCESSING LETTERS, 2016, 116 (06) : 428 - 432
  • [30] On the Black-Box Complexity of Sperner’s Lemma
    Katalin Friedl
    Gábor Ivanyos
    Miklos Santha
    Yves F. Verhoeven
    Theory of Computing Systems, 2009, 45