Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-wg55d Total loading time: 0 Render date: 2024-05-21T01:47:11.735Z Has data issue: false hasContentIssue false

8 - Crypto

Published online by Cambridge University Press:  05 April 2013

Scott Aaronson
Affiliation:
Massachusetts Institute of Technology
Get access

Summary

Answers to puzzles from Chapter 7

Puzzle 1. We are given a biased coin that comes up heads with probability p. Using this coin, construct an unbiased coin.

Solution. The solution is the “von Neumann trick”: flip the biased coin twice, interpreting HT as heads and TH as tails. If the flips come up HH or TT, then try again. Under this scheme, “heads” and “tails” are equiprobable, each occurring with probability p(1 - p) in any given trial. Conditioned on either HT or TH occurring, it follows that the simulated coin is unbiased.

Puzzle 2. n people sit in a circle. Each person wears either a red hat or a blue hat, chosen independently and uniformly at random. Each person can see the hats of all the other people, but not his/her own hat. Based only upon what they see, each person votes on whether or not the total number of red hats is odd. Is there a scheme by which the outcome of the vote is correct with probability greater than ½?

Solution. Each person decides his/her vote as follows: if the number of visible blue hats is larger than the number of visible red hats, then vote according to the parity of the number of visible red hats. Otherwise, vote the opposite of the parity of the number of visible red hats. If the number of red hats differs from the number of blue hats by at least 2, then this scheme succeeds with certainty. Otherwise, the scheme might fail. However, the probability that the number of red hats differs from the number of blue hats by less than 2 is small – O(1/√N).

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2013

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Kahn, D., The Codebreakers (New York: Scribner, 1996)Google Scholar
L. Blum, M. Blum and M. Shub, A Simple Unpredictable Pseudo-Random Number Generator, SIAM Journal on Computing, 15 (1996), 364–383
Ajtai, M. and Dwork, C., A public-key cryptosystem with worst-case/average-case equivalence. In Proceedings of 29th Annual ACM Symposium on Theory of Computing (New York: ACM, 1997), pp. 284–93Google Scholar
Regev, O., On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM, 56:6 (2009), 1–40CrossRefGoogle Scholar
Håstad, J., Impagliazzo, R., Levin, L. A. and Luby, M., A pseudorandom generator from any one-way function. SIAM Journal on Computing, 28:4 (1999), 1364–96CrossRefGoogle Scholar
Chi-Chih Yao, A., Theory and applications of trapdoor functions [extended abstract]. In Proceedings of 24th Annual IEEE Symposium on Foundations of Computer Science (Silver Spring, MD: IEEE Computer Society Press, 1982), pp. 80–91Google Scholar
Peikert, C., Public-key cryptosystems from the worst-case shortest vector problem [extended abstract]. In Proceedings of Annual ACM Symposium on Theory of Computing (New York: ACM, 2009), pp. 333–42CrossRefGoogle Scholar
Gentry, C., Fully homomorphic encryption using ideal lattices. In Proceedings of Annual ACM Symposium on Theory of Computing (New York: ACM, 2009), pp. 169–78CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Crypto
  • Scott Aaronson, Massachusetts Institute of Technology
  • Book: Quantum Computing since Democritus
  • Online publication: 05 April 2013
  • Chapter DOI: https://doi.org/10.1017/CBO9780511979309.009
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Crypto
  • Scott Aaronson, Massachusetts Institute of Technology
  • Book: Quantum Computing since Democritus
  • Online publication: 05 April 2013
  • Chapter DOI: https://doi.org/10.1017/CBO9780511979309.009
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Crypto
  • Scott Aaronson, Massachusetts Institute of Technology
  • Book: Quantum Computing since Democritus
  • Online publication: 05 April 2013
  • Chapter DOI: https://doi.org/10.1017/CBO9780511979309.009
Available formats
×