Skip to content

Latest commit

 

History

History
3 lines (3 loc) · 264 Bytes

Foundations.md

File metadata and controls

3 lines (3 loc) · 264 Bytes
  • Two important requirements on any secure computation protocol are privacy and correctness.
  • Threshold Cryptography deals with digital signatures and decryption techniques.
  • MPC protocols for an honest majority typically utilise secret sharing as a basic tool.