Gate動態廣場創作者星火招募計劃限時開啓!
無論你是加密KOL、項目方還是媒體,現在入駐發帖,即可搶先解鎖:Gate百萬流量曝光、超$10,000月度激勵獎金、深度生態合作資源等專屬福利!
參與攻略:
1️⃣ 立即填寫申請表:https://docs.google.com/forms/d/e/1FAIpQLSdStzGVu-fj14EM07-cVLYf0pk0axwMQbS-0tk1YK3Y6x5Vew/viewform?usp=header
2️⃣ 審核通過,開啓創作之旅!
🎁 活動獎金獎勵:
基礎創作激勵:參與動態內容挖礦,輕鬆發帖即可獲得高達10%手續費返佣!
$10,000/月內容激勵池:每週精選TOP 10優質內容,入選即獎勵 $50 USDT/篇!
爆款內容獎勵:閱讀量≥3萬可獲得額外 $50 USDT,閱讀量≥10萬可獲得額外 $100 USDT!
🎁 生態合作&流量曝光權益:
空投/AMA/白名單等項目合作優先權
參與Gate Labs早期項目評測,贏潛在種子輪獎勵
APP首頁推薦位、官方宣發、峯會嘉賓等資源加持
本活動長期開放,首批入駐動態廣場用戶權益優先!
立即申請,搶佔流量紅利,輕鬆發帖賺高額獎勵,項目方更有生態扶持等你來享!
MPC and Blockchain Cryptography: A Deep Dive
Multiparty computation (MPC) and blockchain are both distributed systems. This article serves as a learning note (a directory entry) on cryptography, MPC, and blockchain.
Symmetric encryption, asymmetric encryption, and hash functions basically constitute all levels of cryptographic algorithms.
Cryptographic protocols include:
A key concept in MPC is simulation, which means bringing the hypothetical world of the ideal into the real world (especially with regard to trust). Six important characteristics that need to be considered are:
Based on different levels of untrustworthiness, there are several security models in cryptography:
Garbled circuits (GC) and oblivious transfer (OT) are two protocols that are suitable for logical operations but not arithmetic operations. They are mostly studied between two parties rather than multiple parties (although many people are researching how to convert 2PC into MPC).
The bottom-level technology of MPC is secret sharing (SS), which essentially involves taking some points to fit a curve. It is more suitable for linear operations such as addition, but not for multiplication. Multiplication is also a major challenge when constructing MPC. SS has advanced to include verifiable secret sharing (VSS) and publicly verifiable secret sharing (pVSS). pVSS can be understood from a cryptographic perspective as a blockchain, but there is currently no mature solution.
The difficulty of completing digital signatures with MPC lies in how to use TSS to complete an asymmetric encryption.
Digital signatures:
In summary, MPC is a cryptographic technique that enables multiple parties to collaborate on a computation without revealing their private inputs. It is a crucial tool for achieving privacy-preserving distributed computation and can be applied to many fields, such as secure machine learning, secure computation outsourcing, and privacy-preserving data analysis. Note: this article is a translation and summary for easier reading of a Twitter thread by 0x30cF.