{"id":"https://openalex.org/W3198023309","doi":"https://doi.org/10.1109/isit45174.2021.9518276","title":"Optimally-secure Coin-tossing against a Byzantine Adversary","display_name":"Optimally-secure Coin-tossing against a Byzantine Adversary","publication_year":2021,"publication_date":"2021-07-12","ids":{"openalex":"https://openalex.org/W3198023309","doi":"https://doi.org/10.1109/isit45174.2021.9518276","mag":"3198023309"},"language":"en","primary_location":{"id":"doi:10.1109/isit45174.2021.9518276","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9518276","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023916075","display_name":"Hamidreza Amini Khorasgani","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hamidreza Amini Khorasgani","raw_affiliation_strings":["Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","Department of Computer Science, Purdue University, West Lafayette, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, Indiana, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082365034","display_name":"Hemanta K. Maji","orcid":"https://orcid.org/0000-0003-4244-8658"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hemanta K. Maji","raw_affiliation_strings":["Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","Department of Computer Science, Purdue University, West Lafayette, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, Indiana, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100692035","display_name":"Mingyuan Wang","orcid":"https://orcid.org/0000-0001-6569-1154"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mingyuan Wang","raw_affiliation_strings":["Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","Department of Computer Science, Purdue University, West Lafayette, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University,Department of Computer Science,West Lafayette,Indiana,USA,47907","institution_ids":["https://openalex.org/I219193219"]},{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, Indiana, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023916075"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.5677,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73838042,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"2858","last_page":"2863"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9519000053405762,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9484000205993652,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7654318809509277},{"id":"https://openalex.org/keywords/coin-flipping","display_name":"Coin flipping","score":0.6795550584793091},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.648154079914093},{"id":"https://openalex.org/keywords/byzantine-architecture","display_name":"Byzantine architecture","score":0.5547632575035095},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49056118726730347},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.44334954023361206},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19066941738128662},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.08824142813682556},{"id":"https://openalex.org/keywords/ancient-history","display_name":"Ancient history","score":0.06445035338401794}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7654318809509277},{"id":"https://openalex.org/C97399411","wikidata":"https://www.wikidata.org/wiki/Q825367","display_name":"Coin flipping","level":2,"score":0.6795550584793091},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.648154079914093},{"id":"https://openalex.org/C104562893","wikidata":"https://www.wikidata.org/wiki/Q47591","display_name":"Byzantine architecture","level":2,"score":0.5547632575035095},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49056118726730347},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.44334954023361206},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19066941738128662},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.08824142813682556},{"id":"https://openalex.org/C195244886","wikidata":"https://www.wikidata.org/wiki/Q41493","display_name":"Ancient history","level":1,"score":0.06445035338401794},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit45174.2021.9518276","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9518276","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320309667","display_name":"Purdue Research Foundation","ror":"https://ror.org/007n03h88"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1510135378","https://openalex.org/W1979162881","https://openalex.org/W1987754111","https://openalex.org/W1999678910","https://openalex.org/W2019121884","https://openalex.org/W2047964326","https://openalex.org/W2056579989","https://openalex.org/W2081052144","https://openalex.org/W2094975553","https://openalex.org/W2150404372","https://openalex.org/W2742022539","https://openalex.org/W2895435412","https://openalex.org/W2916806630","https://openalex.org/W2965713907","https://openalex.org/W2991045807","https://openalex.org/W3002604948","https://openalex.org/W3013399264","https://openalex.org/W3013833912","https://openalex.org/W3030107909","https://openalex.org/W3080455538","https://openalex.org/W3108497749","https://openalex.org/W3136243343","https://openalex.org/W4289440734","https://openalex.org/W6630399292","https://openalex.org/W6755003795","https://openalex.org/W6755145302","https://openalex.org/W6759572324","https://openalex.org/W6777028835"],"related_works":["https://openalex.org/W2123681352","https://openalex.org/W1658340114","https://openalex.org/W2808242528","https://openalex.org/W2999599390","https://openalex.org/W1567638270","https://openalex.org/W4295124898","https://openalex.org/W2212585693","https://openalex.org/W3112099530","https://openalex.org/W4387985143","https://openalex.org/W4362599004"],"abstract_inverted_index":{"Ben-Or":[0],"and":[1,173,193,212,220,225,228,230,263,311],"Linial":[2],"(1985)":[3],"introduced":[4],"the":[5,34,37,48,56,91,133,137,141,200,245,316,322,325,329,347,373,380],"full":[6],"information":[7],"model":[8,186],"for":[9,26,47,165,207,290,333,391],"coin-tossing":[10,75,107,129,159,181,203,253,281,297,340],"protocols":[11,42,76,160,182,282,313,327,362,375],"involving":[12],"<tex":[13,71,98,104,113,124,156,167,178,209,213,235,250,294,357,393],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[14,72,99,105,114,125,157,168,179,210,214,236,251,295,358,394],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$n$</tex>":[15,73,211],"processors":[16],"with":[17,111,121],"unbounded":[18],"computational":[19],"power":[20],"using":[21,283],"a":[22,145,284,288,344,377],"common":[23],"broadcast":[24,93],"channel":[25],"all":[27,208],"their":[28],"communications.":[29],"For":[30,354],"most":[31],"adversarial":[32,185,304,352],"settings,":[33],"characterization":[35],"of":[36,247,346,372,379,397,400],"exact":[38,57],"or":[39,59],"asymptotically":[40],"optimal":[41,206,348,381],"remains":[43],"open.":[44],"Furthermore,":[45,217],"even":[46,332],"settings":[49],"where":[50,77,187],"near-optimal":[51,162],"asymptotic":[52],"constructions":[53],"are":[54,64,205],"known,":[55],"constants":[58],"poly-logarithmic":[60],"multiplicative":[61],"factors":[62],"involved":[63],"not":[65],"entirely":[66],"well-understood.":[67],"This":[68],"work":[69],"studies":[70],"-processor":[74],"every":[78,166],"processor":[79,265],"broadcasts":[80,190],"an":[81,191,276,368],"arbitrary-length":[82,261,334],"message":[83],"once.":[84],"An":[85],"adaptive":[86],"Byzantine":[87,146],"adversary,":[88],"based":[89],"on":[90],"messages":[92],"so":[94],"far,":[95],"can":[96,148],"corrupt":[97],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$k=1$</tex>":[100],"processor.":[101],"A":[102,128],"bias-":[103,155,177,249,293],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$X$</tex>":[106,115,158,180,252,296,395],"protocol":[108,349],"outputs":[109,119],"1":[110],"probability":[112,122],";":[116],"otherwise,":[117],"it":[118],"0":[120],"(":[123],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$1-X$</tex>":[126],").":[127],"protocol's":[130,298],"insecurity":[131,164,342],"is":[132,152,308,320,343,376],"maximum":[134],"change":[135],"in":[136,183,302,350],"output":[138,246],"distribution":[139],"(in":[140],"statistical":[142],"distance)":[143],"that":[144,199,234,314,324,338,360,367],"adversary":[147],"cause.":[149],"Our":[150,306],"objective":[151],"to":[153,243,269,279,300],"identify":[154],"achieving":[161],"minimum":[163],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$X\\in[0,1]$</tex>":[169,359],".":[170,216],"Lichtenstein,":[171],"Linial,":[172],"Saks":[174],"(1989)":[175],"studied":[176],"this":[184],"each":[188,264],"party":[189],"independent":[192],"uniformly":[194],"random":[195],"bit.":[196],"They":[197],"proved":[198],"elegant":[201],"\u201cthreshold":[202],"protocols\u201d":[204],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$k$</tex>":[215],"Goldwasser,":[218],"Kalai,":[219,223],"Park":[221],"(2015),":[222],"Komargodski,":[224],"Raz":[226],"(2018),":[227],"Haitner":[229],"Karidi-Heller":[231],"(2020)":[232],"prove":[233,366],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$k=\\mathcal{O}(\\sqrt{n}":[237],"\\cdot":[238],"\\mathsf{polylog}(n)$</tex>":[239],")":[240],"corruptions":[241],"suffice":[242],"fix":[244],"any":[248,292,355],"protocol.":[254,382],"These":[255],"results":[256,385],"encompass":[257],"parties":[258],"who":[259],"send":[260],"messages,":[262],"has":[266],"multiple":[267],"turns":[268],"reveal":[270],"its":[271],"entire":[272],"message.":[273],"We":[274,336],"use":[275],"inductive":[277],"approach":[278],"constructing":[280],"potential":[285,317,330],"function":[286],"as":[287],"proxy":[289],"measuring":[291],"susceptibility":[299],"attacks":[301],"our":[303,351],"model.":[305,353],"technique":[307],"inherently":[309],"constructive":[310],"yields":[312],"minimize":[315,328],"function.":[318],"It":[319],"incidentally":[321],"case":[323],"threshold":[326,361,374],"function,":[331],"messages.":[335],"demonstrate":[337],"these":[339,384],"protocols'":[341],"2-approximation":[345],"other":[356],"cannot":[363],"realize,":[364],"we":[365],"appropriate":[369],"(convex)":[370],"combination":[371],"4-approximation":[378],"Finally,":[383],"entail":[386],"new":[387],"(vertex)":[388],"isoperimetric":[389],"inequalities":[390],"density-":[392],"subsets":[396],"product":[398],"spaces":[399],"arbitrary-size":[401],"alphabets.":[402]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
