{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T04:14:01Z","timestamp":1772165641278,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642195709","type":"print"},{"value":"9783642195716","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19571-6_28","type":"book-chapter","created":{"date-parts":[[2011,3,22]],"date-time":"2011-03-22T12:04:42Z","timestamp":1300795482000},"page":"468-485","source":"Crossref","is-referenced-by-count":7,"title":["Tight Bounds for Classical and Quantum Coin Flipping"],"prefix":"10.1007","author":[{"given":"Esther","family":"H\u00e4nggi","sequence":"first","affiliation":[]},{"given":"J\u00fcrg","family":"Wullschleger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Aharonov, D., Ta-Shma, A., Vazirani, U.V., Yao, A.C.: Quantum bit escrow. In: STOC 2000: Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, pp. 705\u2013714 (2000)","DOI":"10.1145\/335305.335404"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Ambainis, A.: A new protocol and lower bounds for quantum coin flipping. In: STOC 2001: Proceedings of the 33rd Annual ACM Symposium on Theory of Computing, pp. 134\u2013142 (2001)","DOI":"10.1145\/380752.380788"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Ambainis, A., Buhrman, H., Dodis, Y., R\u00f6hrig, H.: Multiparty quantum coin flipping. In: CCC 2004: Proceedings of the 19th Annual IEEE Conference on Computational Complexity, pp. 250\u2013259 (2004)","DOI":"10.1109\/CCC.2004.1313848"},{"key":"28_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-24638-1_14","volume-title":"Theory of Cryptography","author":"A. Beimel","year":"2004","unstructured":"Beimel, A., Malkin, T.: A quantitative approach to reductions in secure computation. In: Naor, M. (ed.) TCC 2004. LNCS, vol.\u00a02951, pp. 238\u2013257. Springer, Heidelberg (2004)"},{"issue":"1","key":"28_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1008908.1008911","volume":"15","author":"M. Blum","year":"1983","unstructured":"Blum, M.: Coin flipping by telephone a protocol for solving impossible problems. SIGACT News\u00a015(1), 23\u201327 (1983)","journal-title":"SIGACT News"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Chailloux, A., Kerenidis, I.: Optimal quantum strong coin flipping. In: FOCS 2009: Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, pp. 527\u2013533 (2009)","DOI":"10.1109\/FOCS.2009.71"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Cleve, R.: Limits on the security of coin flips when half the processors are faulty. In: STOC 1986: Proceedings of the 18th Annual ACM Symposium on Theory of Computing, pp. 364\u2013369 (1986)","DOI":"10.1145\/12130.12168"},{"issue":"5-6","key":"28_CR8","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.physleta.2006.10.062","volume":"362","author":"R. Colbeck","year":"2007","unstructured":"Colbeck, R.: An entanglement-based protocol for strong coin tossing with bias 1\/4. Physics Letters\u00a0A\u00a0362(5-6), 390\u2013392 (2007)","journal-title":"Physics Letters\u00a0A"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/11761679_30","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"D. Hofheinz","year":"2006","unstructured":"Hofheinz, D., M\u00fcller-Quade, J., Unruh, D.: On the (Im-)Possibility of extending coin toss. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 504\u2013521. Springer, Heidelberg (2006)"},{"issue":"3","key":"28_CR10","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.ipl.2003.07.007","volume":"89","author":"I. Kerenidis","year":"2004","unstructured":"Kerenidis, I., Nayak, A.: Weak coin flipping with small bias. Information Processing Letters\u00a089(3), 131\u2013135 (2004)","journal-title":"Information Processing Letters"},{"key":"28_CR11","unstructured":"Kitaev, A.: Quantum coin-flipping. In: QIP 2003 (2002), Slides http:\/\/www.msri.org\/publications\/ln\/msri\/2002\/qip\/kitaev\/1\/index.html"},{"issue":"1-2","key":"28_CR12","first-page":"177","volume":"120","author":"H.-K. Lo","year":"1998","unstructured":"Lo, H.-K., Chau, H.F.: Why quantum bit commitment and ideal quantum coin tossing are impossible. Physica\u00a0D\u00a0120(1-2), 177\u2013187 (1998)","journal-title":"Physica\u00a0D"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Mochon, C.: Quantum weak coin-flipping with bias of 0.192. In: FOCS 2004: Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science, pp. 2\u201311 (2004)","DOI":"10.1109\/FOCS.2004.55"},{"issue":"3","key":"28_CR14","doi-asserted-by":"publisher","first-page":"32312","DOI":"10.1103\/PhysRevA.70.032312","volume":"70","author":"C. Mochon","year":"2004","unstructured":"Mochon, C.: Serial composition of quantum coin flipping and bounds on cheat detection for bit commitment. Physical Review\u00a0A\u00a070(3), 32312 (2004)","journal-title":"Physical Review\u00a0A"},{"key":"28_CR15","unstructured":"Mochon, C.: Quantum weak coin flipping with arbitrarily small bias (2007), http:\/\/arxiv.org\/abs\/0711.4114"},{"key":"28_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-00457-5_1","volume-title":"Theory of Cryptography","author":"T. Moran","year":"2009","unstructured":"Moran, T., Naor, M., Segev, G.: An optimally fair coin toss. In: Reingold, O. (ed.) TCC 2009. LNCS, vol.\u00a05444, pp. 1\u201318. Springer, Heidelberg (2009)"},{"issue":"8","key":"28_CR17","doi-asserted-by":"publisher","first-page":"83037","DOI":"10.1088\/1367-2630\/10\/8\/083037","volume":"10","author":"A.T. Nguyen","year":"2008","unstructured":"Nguyen, A.T., Frison, J., Huy, K.P., Massar, S.: Experimental quantum tossing of a single coin. New Journal of Physics\u00a010(8), 83037 (2008)","journal-title":"New Journal of Physics"},{"issue":"1","key":"28_CR18","doi-asserted-by":"publisher","first-page":"12310","DOI":"10.1103\/PhysRevA.65.012310","volume":"65","author":"R.W. Spekkens","year":"2001","unstructured":"Spekkens, R.W., Rudolph, T.: Degrees of concealment and bindingness in quantum bit commitment protocols. Physical Review\u00a0A\u00a065(1), 12310 (2001)","journal-title":"Physical Review\u00a0A"},{"issue":"22","key":"28_CR19","doi-asserted-by":"publisher","first-page":"227901","DOI":"10.1103\/PhysRevLett.89.227901","volume":"89","author":"R.W. Spekkens","year":"2002","unstructured":"Spekkens, R.W., Rudolph, T.: A quantum protocol for cheat-sensitive weak coin flipping. Physical Review Letters\u00a089(22), 227901 (2002)","journal-title":"Physical Review Letters"},{"key":"28_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1007\/978-3-642-14623-7_38","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"S. Winkler","year":"2010","unstructured":"Winkler, S., Wullschleger, J.: On the efficiency of classical and quantum oblivious transfer reductions. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 707\u2013723. Springer, Heidelberg (2010)"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: FOCS 1982: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Theory of Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19571-6_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T16:56:52Z","timestamp":1741107412000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19571-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195709","9783642195716"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19571-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}