-
I don't understand what is being done in:
https://github.com/ldsec/lattigo/blob/bb095f1d82cd5c532171b138cd0ad83ecd785103/dckks/public_refresh.go
There is no documentation on this, including here: …
-
We would like to collaborate with teams in order to create wallets for the Polkadot network.
There is limited documentation yet. However, teams could take a look at the code that Jaco wrote for the…
-
Thank you so much for JIFF!
I have a question on the security model. As far as I know, there are 3 roles in JIFF: 1 server, 2 or 3 computation parties, N input parties. Which ones can be semi-hone…
-
## Feature
I would like to use crypten with javascript application ( nodejs, vuejs, etc. ). It would be nice to have javascript encryption/decryption. If I would like to use some encrypted web api…
-
### MASTERPLAN
- [x] Literature review
- [x] Document signature aggregation schemes
- [x] Document pros/cons of each method
- [x] Choose a best signature aggregation scheme
- [x] Build a re…
-
There are possibly two lines of security/cryptography works:
- The more theoretical side, creating new cryptographic primitives from basic assumptions.
- The more applied crypto side, leveraging…
-
- Uvod u blockchain
- Šta je distributed ledger. Transakcije. Digitalni Potpisi.
- Generalna pitanja oko Consensusa. PoW, PoS.
- Pitanja skalabilnosti
- Byzantine agreement protoko…
-
We need to figure out how to generate `g` and `h` parameters used for discrete log problem in Pedersen VSS.
This card covers research and pseudocode implementation of the setup protocol.
-
Add awesome-mpc (multiparty computation) related to cryptography
https://github.com/rdragos/awesome-mpc
Add awesome-self-stabilization related to distributed algorithms
https://github.com/manishk…
-
I want to recover from bytes.
```rust
fn main() {
let ec_point: GE = ECPoint::generator();
let secret: FE = ECScalar::new_random();
let public: GE = ec_point.scalar_mul(&secret.get_el…