Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness

Consider designing a distributed coin-tossing protocol for n processors such that the probability of heads is X0 in [0,1], and an adversary can reset one processor to change the distribution of the final outcome. For X0=1/2, in the non-cryptographic setting, Blum's majority protocol is 1/√(2π n) insecure. For computationally bounded adversaries and any X0 in [0,1], the protocol of Moran,Naor,Segev (2009) is only O(1/n) insecure. In this paper, we study discrete-time martingales (X0,X1,..,Xn) such that Xi in [0,1], for all i in 0,..,n, and Xn in 0,1. In particular, for any X0 in [0,1], we construct martingales that yield 1/2√(X_0(1-X_0)/n) insecure coin-tossing protocols with n-bit communication; irrespective of the number of bits required to represent the output distribution. Note that for sufficiently small X0, we achieve higher security than Moran et al's protocol even against computationally unbounded adversaries. For X0=1/2, our protocol requires only 40 introduce a new inductive technique that uses geometric transformations to estimate the large gaps in these martingales. For any X0 in [0,1], we show that there exists a stopping time T such that E[|X_T-X_T-1|]≥2/√(2n-1)· X_0(1-X_0). The inductive technique also constructs martingales that demonstrate the optimality of our bound - we construct optimal martingales such that any T hasE[|X_T-X_T-1|]≤1/√(n)·√(X_0(1-X_0)). Our lower-bound holds for all X0 in [0,1]; while the previous bound of Cleve,Impagliazzo (1993) exists only for positive constant X0. Our approach only employs elementary techniques and avoids the complex probabilistic tools inherent to the approaches of Cleve,Impagliazzo (1993) and Beimel,Haitner,Makriyannis,Omri (2018).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/25/2019

Leader Election Requires Logarithmic Time in Population Protocols

In this paper, it is shown that any leader election problem requires log...
research
08/23/2022

Strong XOR Lemma for Communication with Bounded Rounds

In this paper, we prove a strong XOR lemma for bounded-round two-player ...
research
05/03/2021

Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols

Let π be an efficient two-party protocol that given security parameter κ...
research
09/16/2020

Perfectly Secure Message Transmission against Rational Adversaries

Secure Message Transmission (SMT) is a two-party cryptographic protocol ...
research
04/19/2022

The White-Box Adversarial Data Stream Model

We study streaming algorithms in the white-box adversarial model, where ...
research
02/14/2019

Classification in a Large Network

We construct and analyze the communication cost of protocols (interactiv...
research
05/13/2021

The Inductive Approach to Verifying Cryptographic Protocols

Informal arguments that cryptographic protocols are secure can be made r...

Please sign up or login with your details

Forgot password? Click here to reset