Gate动态广场创作者星火招募计划限时开启!
无论你是加密KOL、项目方还是媒体,现在入驻发帖,即可抢先解锁:Gate百万流量曝光、超$10,000月度激励奖金、深度生态合作资源等专属福利!
参与攻略:
1️⃣ 立即填写申请表:https://docs.google.com/forms/d/e/1FAIpQLSdStzGVu-fj14EM07-cVLYf0pk0axwMQbS-0tk1YK3Y6x5Vew/viewform?usp=header
2️⃣ 审核通过,开启创作之旅!
🎁 活动奖金奖励:
基础创作激励:参与动态内容挖矿,轻松发帖即可获得高达10%手续费返佣!
$10,000/月内容激励池:每周精选TOP 10优质内容,入选即奖励 $50 USDT/篇!
爆款内容奖励:阅读量≥3万可获得额外 $50 USDT,阅读量≥10万可获得额外 $100 USDT!
🎁 生态合作&流量曝光权益:
空投/AMA/白名单等项目合作优先权
参与Gate Labs早期项目评测,赢潜在种子轮奖励
APP首页推荐位、官方宣发、峰会嘉宾等资源加持
本活动长期开放,首批入驻动态广场用户权益优先!
立即申请,抢占流量红利,轻松发帖赚高额奖励,项目方更有生态扶持等你来享!
MPC and Blockchain Cryptography: A Deep Dive
Multiparty computation (MPC) and blockchain are both distributed systems. This article serves as a learning note (a directory entry) on cryptography, MPC, and blockchain.
Symmetric encryption, asymmetric encryption, and hash functions basically constitute all levels of cryptographic algorithms.
Cryptographic protocols include:
A key concept in MPC is simulation, which means bringing the hypothetical world of the ideal into the real world (especially with regard to trust). Six important characteristics that need to be considered are:
Based on different levels of untrustworthiness, there are several security models in cryptography:
Garbled circuits (GC) and oblivious transfer (OT) are two protocols that are suitable for logical operations but not arithmetic operations. They are mostly studied between two parties rather than multiple parties (although many people are researching how to convert 2PC into MPC).
The bottom-level technology of MPC is secret sharing (SS), which essentially involves taking some points to fit a curve. It is more suitable for linear operations such as addition, but not for multiplication. Multiplication is also a major challenge when constructing MPC. SS has advanced to include verifiable secret sharing (VSS) and publicly verifiable secret sharing (pVSS). pVSS can be understood from a cryptographic perspective as a blockchain, but there is currently no mature solution.
The difficulty of completing digital signatures with MPC lies in how to use TSS to complete an asymmetric encryption.
Digital signatures:
In summary, MPC is a cryptographic technique that enables multiple parties to collaborate on a computation without revealing their private inputs. It is a crucial tool for achieving privacy-preserving distributed computation and can be applied to many fields, such as secure machine learning, secure computation outsourcing, and privacy-preserving data analysis. Note: this article is a translation and summary for easier reading of a Twitter thread by 0x30cF.