skip to main content
10.1145/28395.28420acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

How to play ANY mental game

Published:01 January 1987Publication History

ABSTRACT

We present a polynomial-time algorithm that, given as a input the description of a game with incomplete information and any number of players, produces a protocol for playing the game that leaks no partial information, provided the majority of the players is honest.

Our algorithm automatically solves all the multi-party protocol problems addressed in complexity-based cryptography during the last 10 years. It actually is a completeness theorem for the class of distributed protocols with honest majority. Such completeness theorem is optimal in the sense that, if the majority of the players is not honest, some protocol problems have no efficient solution [C].

References

  1. Ba.D. Barrington , Bounded-Width Branehin9 Programs Recognize Exactly Those Languages in NC~, Proc. 18th STOC, 1986 pp 1-5 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bl.M. Blum, Coin Flipping by Telephone, IEEE COMPCON 1982, pp. 133-137.Google ScholarGoogle Scholar
  3. BH.R. Boppana and R. Hirschfeld, Pseudo-Random Generatoro and Complexity Clauses, To appear in Randomness and Computation, 5th volume of Advances in Computing Research, ed. S. MicaliGoogle ScholarGoogle Scholar
  4. BM.M. Blum and S. Micali, How To Generate Sequences Of C~ptographically Strong Pseudo- Random Bits, SiAM J. on Computing, Vol. 13, Nov 1984, pp. 850-864 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. CG.B. Chor and O. Goldreich, RSA/Rabi, Bits Are 1/2 4- 1/poly(log N) Seeure, To appear SIAM J. on Computing. Earlier version in Proc. FOCS 1984, pp. 449- 463Google ScholarGoogle Scholar
  6. CGMA.B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults', Proc. 26th FOCS, 1985, pp. 383-395Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. EGL.S. Even, O. Goldreich, and A. Lempel, A Randomized Protoeol for Signing Contraets, CACM, vol. 28, No. 6, 1985, pp. 637-647 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. FMRW.M.Fiseher, S. Mieali, C. Raekoff and D. Witenberg, A Secure Protocol for the Oblivious Transfer, In preperation 1986.Google ScholarGoogle Scholar
  9. GM.S. Goldwa~ser, and S. Micali, Probabilisti~ Eneryption, JCSS Vol. 28, No. 2, April 1984. An earlier version (containing other results) was tiffed Probabilistic Encryption and How to Play Mental Poker Hideing All Partial Information,Google ScholarGoogle Scholar
  10. GMR.g. Goldwasser, S. Micali and C. Rackoff, 7he Knowledge Complexity of Interaetive Proof- Systems, To appear SIAM J. on Computing (manuscript available from authors). Earlier version in Proc. 17th Annual ACM Symp. on Theory of Computing, pp 291-304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. GoMiRi.S. Goldwasser, S. Micali, and R. Rivest, A Digital Signature Scheme Secure Against Adaptive, Chosen Gyphertext Attack To appear in SIAM J. on Computing (available from authors) Earlier version, titled 'A Paradoxical Solution to The Signature Problem, in Proc. 25th FOCS, 1984, pp. 441-448Google ScholarGoogle Scholar
  12. GMW.O. Goldreich, S. Micali and A. Wigderson, Proofs that Yield Nothing but their Validity and a Methodology of U~ptographie Design, Proe. of FOCS 1986.Google ScholarGoogle Scholar
  13. HR.J. Halpern and M.O. Rabin, A Logic to reaaon about likehood, Proc. of 15th STOC, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L.L. Leonid, One-Wa3t Functions and PseudO- Random Generators, Proc. 17th STOC, 1985, pp. 363-365 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Y.A.Yao, Theory and Application of Trapdoor Functions, Proc. of 23rd FOCS, IEEE, Nov., ~982, pp 80-9t. Google ScholarGoogle ScholarCross RefCross Ref
  16. Y2.A.Yao, How to Generate and Exchang~ Secrets, Proc. 27th STOC, 1986, pp. 162-167Google ScholarGoogle Scholar

Index Terms

  1. How to play ANY mental game

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Conferences
                    STOC '87: Proceedings of the nineteenth annual ACM symposium on Theory of computing
                    January 1987
                    471 pages
                    ISBN:0897912217
                    DOI:10.1145/28395

                    Copyright © 1987 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 1 January 1987

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • Article

                    Acceptance Rates

                    STOC '87 Paper Acceptance Rate50of165submissions,30%Overall Acceptance Rate1,469of4,586submissions,32%

                    Upcoming Conference

                    STOC '24
                    56th Annual ACM Symposium on Theory of Computing (STOC 2024)
                    June 24 - 28, 2024
                    Vancouver , BC , Canada

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader