{"id":"https://openalex.org/W3198385441","doi":"https://doi.org/10.1109/isit45174.2021.9518000","title":"Efficient Distributed Coin-tossing Protocols","display_name":"Efficient Distributed Coin-tossing Protocols","publication_year":2021,"publication_date":"2021-07-12","ids":{"openalex":"https://openalex.org/W3198385441","doi":"https://doi.org/10.1109/isit45174.2021.9518000","mag":"3198385441"},"language":"en","primary_location":{"id":"doi:10.1109/isit45174.2021.9518000","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9518000","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023916075","display_name":"Hamidreza Amini Khorasgani","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hamidreza Amini Khorasgani","raw_affiliation_strings":["Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","Department of Computer Science, Purdue University, West Lafayette, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, Indiana, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082365034","display_name":"Hemanta K. Maji","orcid":"https://orcid.org/0000-0003-4244-8658"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hemanta K. Maji","raw_affiliation_strings":["Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","Department of Computer Science, Purdue University, West Lafayette, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, Indiana, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015806378","display_name":"Himanshi K. Mehta","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Himanshi Mehta","raw_affiliation_strings":["Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","Department of Computer Science, Purdue University, West Lafayette, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, Indiana, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100692035","display_name":"Mingyuan Wang","orcid":"https://orcid.org/0000-0001-6569-1154"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mingyuan Wang","raw_affiliation_strings":["Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","Department of Computer Science, Purdue University, West Lafayette, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, Indiana, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023916075"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.1398,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.55884528,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"2852","last_page":"2857"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6560090780258179},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6114243268966675},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5890786647796631},{"id":"https://openalex.org/keywords/coin-flipping","display_name":"Coin flipping","score":0.5833053588867188},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40310901403427124},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.37346047163009644},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.33669090270996094},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32777923345565796},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2720375955104828},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1844964325428009},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.18432849645614624}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6560090780258179},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6114243268966675},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5890786647796631},{"id":"https://openalex.org/C97399411","wikidata":"https://www.wikidata.org/wiki/Q825367","display_name":"Coin flipping","level":2,"score":0.5833053588867188},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40310901403427124},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37346047163009644},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.33669090270996094},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32777923345565796},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2720375955104828},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1844964325428009},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.18432849645614624},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit45174.2021.9518000","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9518000","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4577413193","display_name":null,"funder_award_id":"CNS-1566499,CNS-1618822,CNS-2055605","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320309667","display_name":"Purdue Research Foundation","ror":"https://ror.org/007n03h88"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W55671226","https://openalex.org/W60623138","https://openalex.org/W1831187082","https://openalex.org/W1978526953","https://openalex.org/W1980985945","https://openalex.org/W1987754111","https://openalex.org/W2019121884","https://openalex.org/W2047541256","https://openalex.org/W2081052144","https://openalex.org/W2123301539","https://openalex.org/W2150404372","https://openalex.org/W2417650483","https://openalex.org/W2742022539","https://openalex.org/W2896792124","https://openalex.org/W2916806630","https://openalex.org/W2965713907","https://openalex.org/W2991045807","https://openalex.org/W3030107909","https://openalex.org/W6602249328","https://openalex.org/W6602464377","https://openalex.org/W6678388469","https://openalex.org/W6755003795","https://openalex.org/W6759572324","https://openalex.org/W6777028835"],"related_works":["https://openalex.org/W2074833159","https://openalex.org/W2022413236","https://openalex.org/W2915071022","https://openalex.org/W2953203731","https://openalex.org/W1647416393","https://openalex.org/W2895888930","https://openalex.org/W2083226356","https://openalex.org/W1517473992","https://openalex.org/W2007029518","https://openalex.org/W2150405243"],"abstract_inverted_index":{"Ben-Or":[0],"and":[1,87,157,196,216],"Linial":[2],"(1985)":[3],"introduced":[4],"the":[5,61,65,69,84,94,114,126,137,161,168,172,210,226,229],"full":[6],"information":[7],"model":[8],"for":[9,26,152,191],"coin-tossing":[10,35,57,139,164,207],"protocols":[11,165,174,208,212],"involving":[12],"<tex":[13,32,41,52,105,132,193,197],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[14,33,42,53,106,133,194,198],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$n$</tex>":[15],"-processors":[16],"with":[17,39,49],"unbounded":[18],"computational":[19],"power":[20],"using":[21,175],"a":[22,102,176],"common":[23],"broadcast":[24,98],"channel":[25],"all":[27],"their":[28,182],"communications.":[29],"A":[30,56],"bias-":[31],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$X$</tex>":[34,43],"protocol":[36,183],"outputs":[37,47],"1":[38],"probability":[40,50],";":[44],"otherwise,":[45],"it":[46],"0":[48],"(":[51],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$1-X$</tex>":[54],").":[55],"protocol's":[58,85,220],"insecurity":[59],"is":[60,111,184,223],"maximum":[62],"change":[63,125],"in":[64,225],"output":[66,127],"distribution":[67,128],"(in":[68],"statistical":[70],"distance)":[71],"that":[72,120,166],"an":[73,80],"adversary":[74,81,122,149],"can":[75,123,236],"cause.":[76],"This":[77,219],"work":[78],"considers":[79],"who":[82,96],"monitors":[83],"communication":[86],"intervenes":[88],"at":[89,130],"most":[90,131],"once":[91],"by":[92,129],"restarting":[93],"processor":[95],"just":[97],"her":[99],"message.":[100],"For":[101],"given":[103],"tolerance":[104,170],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\varepsilon$</tex>":[107],",":[108,201],"our":[109,153],"objective":[110],"to":[112],"use":[113],"minimum":[115],"number":[116,178],"of":[117,163,179,213,228,232],"processors,":[118],"ensuring":[119],"this":[121,189,202,233],"only":[124],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\epsilon$</tex>":[134],".":[135],"Historically,":[136],"\u201cthreshold":[138],"protocols\u201d":[140],"have":[141],"been":[142],"optimal":[143,146],"or":[144],"asymptotically":[145],"against":[147],"various":[148],"models.":[150],"However,":[151],"model,":[154],"Khorasgani,":[155,214],"Maji,":[156,215],"Mukherjee":[158,217],"(2019)":[159],"prove":[160],"existence":[162],"achieve":[167],"same":[169],"as":[171],"threshold":[173],"smaller":[177],"processors.":[180],"Unfortunately,":[181],"not":[185],"computationally":[186,205],"efficient.":[187],"Towards":[188],"objective,":[190],"any":[192],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$x\\in(0,1)$</tex>":[195],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$n\\in":[199],"\\mathbb{N}$</tex>":[200],"paper":[203],"presents":[204],"efficient":[206],"approximating":[209],"new":[211],"(2019).":[218],"running":[221],"time":[222],"linear":[224],"inverse":[227],"accuracy":[230],"parameter":[231],"approximation,":[234],"which":[235],"be":[237],"set":[238],"arbitrarily":[239],"small.":[240]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
