You must log in or register to comment.
If you’re interested in that kind of problems, here’s some pointer: https://en.m.wikipedia.org/wiki/Secure_multi-party_computation
For a more frivolous, but equally rigorous, approach
There’s an actual article on [remote coin-flipping] (https://en.m.wikipedia.org/wiki/Coin_flipping#Telecommunications)