Coin Flipping - Mathematics - Coin Flipping in Telecommunications

Coin Flipping in Telecommunications

Further information: Commitment scheme

There is no reliable way to use a true coin flip to settle a dispute between two parties if they cannot both see the coin—for example, over the phone. The flipping party could easily lie about the outcome of the toss. In telecommunications and cryptography, the following algorithm can be used:

  1. Alice and Bob each choose a random string, "ljngjkrjgnfdudiudd" and "gfdgdfjkherfsfsd" respectively.
  2. Alice chooses an outcome for an imaginary coin flip, such as "tail"
  3. Bob sends Alice his random string "gfdgdfjkherfsfsd"
  4. Alice immediately computes a SHA-1 hash of the string "tail ljngjkrjgnfdudiudd gfdgdfjkherfsfsd", which is 59dea408d43183a3937957e71a4bcacc616d9cbc and sends it to Bob
  5. Alice asks Bob: "heads or tails"?
  6. Bob says, for instance, "heads".
  7. Alice tells him he's just lost, and proves it by showing the string "tail ljngjkrjgnfdudiudd gfdgdfjkherfsfsd".
  8. Bob can check that Alice didn't lie by computing the SHA-1 of the string himself
  9. Furthermore Bob by providing his own randomly generated string guarantees that Alice wasn't able to precompute an image pair of "tail/random string" or "head/random string".

Read more about this topic:  Coin Flipping, Mathematics

Famous quotes containing the word coin:

    Any language is necessarily a finite system applied with different degrees of creativity to an infinite variety of situations, and most of the words and phrases we use are “prefabricated” in the sense that we don’t coin new ones every time we speak.
    David Lodge (b. 1935)