Cryptographic primitives

Primitives in the distrustful model: weak and strong coin flipping, bit commitment, oblivious transfer, etc.

Security models: in theory, realistic conditions, device independent, relativistic, etc. Complete classification of i.i.d. and non-i.i.d. models and the available tools. Limitations of various models.

Open problems:
 * Simple protocol for weak coin flipping
 * Optimality of oblivious transfer
 * Device-independent oblivious transfer
 * Efficient relativistic protocol for bit commitment (against quantum adversaries)
 * Existence of "relativistic" oblivious transfer (?)

Interested Participants

 * 1) Jed Kaniewski