@
0 reply
0 recast
0 reaction
Cassie Heart
@cassie
Nice example, curious which variant of the Paillier construction is used, they’re a bit tricky to ensure security, especially if prime generation is weakly checking primality. FWIW, when interfacing with a mobile phone, DKLs variants have better security assumptions and performance characteristics.
1 reply
0 recast
3 reactions
Jose Aguinaga
@jjpa
It used the original one in addition to the Chinese Remainder Theorem as an optimization. Code was created by the Safeheron team and is available here - https://github.com/Safeheron/crypto-paillier-js/blob/main/lib/paillier.ts
0 reply
0 recast
1 reaction