Primitives in the distrustful model: weak and strong coin flipping, bit commitment, oblivious transfer, etc.

Security models: in theory, realistic conditions, device independent, relativistic, etc. Complete classification of i.i.d. and non-i.i.d. models and the available tools. Limitations of various models.

Open problems:

  • Simple protocol for weak coin flipping
  • Optimality of oblivious transfer
  • Device-independent oblivious transfer
  • Efficient relativistic protocol for bit commitment (against quantum adversaries)
  • Existence of "relativistic" oblivious transfer (?)

 Interested Participants Edit

  1. Jed Kaniewski

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.