skip to main content
article
Free Access

Coin flipping by telephone a protocol for solving impossible problems

Published:01 January 1983Publication History
Skip Abstract Section

Abstract

Alice and Bob want to flip a coin by telephone. (They have just divorced, live in different cities, want to decide who gets the car.) Bob would not like to tell Alice HEADS and hear Alice (at the other end of the line) say "Here goes . . . I'm flipping the coin. . . . You lost!"Coin-flipping in the SPECIAL way done here has a serious purpose. Indeed, it should prove an INDISPENSABLE TOOL of the protocol designer. Whenever a protocol requires one of two adversaries, say Alice, to pick a sequence of bits at random, and whenever it serves Alice's interests best NOT to pick her sequence of bits at random, then coin-flipping (Bob flipping coins to Alice) as defined here achieves the desired goal:1. It GUARANTEES to Bob that Alice will pick her sequence of bits at random. Her bit is 1 if Bob flips heads to her, O otherwise.2. It GUARANTEES to Alice that Bob will not know WHAT sequence of bits he flipped to her.Coin-flipping has already proved useful in solving a number of problems once thought impossible: mental poker, certified mail, and exchange of secrets. It will certainly prove a useful tool in solving other problems as well.

References

  1. {A'78} D. Angluin, "The Complexity of Some Problems in Number Theory," Lecture Notes available from author, Dept. of Comp. Science, Yale U. (1978).Google ScholarGoogle Scholar
  2. {B'81} M. Blum, "How to Exchange (Secret) Keys," to appear.Google ScholarGoogle Scholar
  3. {BM'81} M. Blum and S. Micali, "Coin-Flipping into a Well," to appear.Google ScholarGoogle Scholar
  4. {BR'81} M. Blum and M. O. Rabin, "Mail Certification by Randomization," to appear.Google ScholarGoogle Scholar
  5. {DH'79} W. Diffie and M. E. Hellman, "Privacy and Authentication: An Introduction to Cryptography," Proc. IEEE, vol. 67 no. 3 (March 1979), 397--427.Google ScholarGoogle ScholarCross RefCross Ref
  6. {L'77} W. J. LeVeque, "Fundamentals of Number Theory," Addison-Wesley Pub., 1977.Google ScholarGoogle Scholar
  7. {M'76} G. L. Miller, "Riemann's Hypothesis and a Test for Primality," J. Comput. and System Sci. vol. 13 (1976), 300--317.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. {MG'81} S. Micali and S. Goldwasser, "Mental Poker Without Commutative Locks," to appear.Google ScholarGoogle Scholar
  9. {R'79} M. O. Rabin, "Digital Signatures and Public Key Systems as Intractable as Factorization," MIT LCS TM 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. {R'80} M. O. Rabin, "Probabilistic Algorithm for Testing Primality," J. Number Theory, vol. 12 (1980), 128--138.Google ScholarGoogle ScholarCross RefCross Ref
  11. {RSA'78} R. L. Rivest, A. Shamir, and L. L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Commun. ACM, vol. 21 (1978), 120--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. {SRA'78} A. Shamir, R. L. Rivest, and L. M. Adleman, "Mental Poker," in The Mathematical Gardner, ed. D. A. Klarner, pub. by Wadsworth Intrntl (1981), 37--43.Google ScholarGoogle Scholar
  13. {SS'77} R. Solovay and V. Strassen, "A Fast Monte-Carlo Test for Primality," SIAM J. Comput. vol. 6 (1977), 84--85.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Coin flipping by telephone a protocol for solving impossible problems
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGACT News
      ACM SIGACT News  Volume 15, Issue 1
      A special issue on cryptography
      Winter-Spring 1983
      83 pages
      ISSN:0163-5700
      DOI:10.1145/1008908
      Issue’s Table of Contents

      Copyright © 1983 Author

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 January 1983

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader