Content pfp
Content
@
0 reply
0 recast
0 reaction

Cassie Heart pfp
Cassie Heart
@cassie
Realizing ZK from MPC sounds like a mind-bender if more familiar with ZK but not MPC, but this lecture by Amit Sahai helps build the intuition that it is not only possible, but it can be a transformative tool for converting honest majority protocols into maliciously secure: https://www.youtube.com/watch?v=-HbqdiCzqE4
3 replies
33 recasts
217 reactions

Shriphani Palakodety pfp
Shriphani Palakodety
@shriphani
what a cool idea - run mpc locally across a bunch of "parties", reveal the trace of messages seen by a subset of these parties and that is your zkp - you get integrity of the result but no additional information.
2 replies
0 recast
3 reactions

Shriphani Palakodety pfp
Shriphani Palakodety
@shriphani
this kind of a zkp wouldn't be succinct though right?
1 reply
0 recast
0 reaction

Lukas pfp
Lukas
@lh1
It is used to build post-quantum signatures https://microsoft.github.io/Picnic/
0 reply
0 recast
1 reaction