In order to obtain our result, we present a constant-round protocol for secure coin-tossing of polynomially many coins (in parallel). We then show how this protocol can be used in conjunction with other existing constructions in order to obtain a constant-round protocol for securely computing any two-party functionality. On the subject of coin-tossing, we also present a constant-round {\em perfect} coin-tossing protocol, where by ``perfect'' we mean that the resulting coins are guaranteed to be statistically close to uniform (and not just pseudorandom).
Category / Keywords: cryptographic protocols / Secure two-party computation, constant-round protocols, coin-tossing Publication Info: An extended abstract appeared at CRYPTO 2001. Date: received 13 Dec 2001, last revised 9 Oct 2003 Contact author: lindell at wisdom weizmann ac il Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20031009:142812 (All versions of this report) Short URL: ia.cr/2001/107 Discussion forum: Show discussion | Start new discussion