⏳ 活動倒計時僅剩 3 天,不要錯過!參與每日 $BTC 價格競猜
成功猜中即有機會贏取1 $BTC,還可瓜分$12,000大獎池!
📈每日兩輪競猜,立即開啓今日預測:https://www.gate.com/activities/price-prediction/?now_period=14
新用戶享 2 次免費預測機會
邀請好友一同參與,解鎖專屬拉新好禮
活動詳情:https://www.gate.com/announcements/article/45755
#Gate # #BTC # #PricePrediction#
MPC and Blockchain Cryptography: A Deep Dive
Multiparty computation (MPC) and blockchain are both distributed systems. This article serves as a learning note (a directory entry) on cryptography, MPC, and blockchain.
Symmetric encryption, asymmetric encryption, and hash functions basically constitute all levels of cryptographic algorithms.
Cryptographic protocols include:
A key concept in MPC is simulation, which means bringing the hypothetical world of the ideal into the real world (especially with regard to trust). Six important characteristics that need to be considered are:
Based on different levels of untrustworthiness, there are several security models in cryptography:
Garbled circuits (GC) and oblivious transfer (OT) are two protocols that are suitable for logical operations but not arithmetic operations. They are mostly studied between two parties rather than multiple parties (although many people are researching how to convert 2PC into MPC).
The bottom-level technology of MPC is secret sharing (SS), which essentially involves taking some points to fit a curve. It is more suitable for linear operations such as addition, but not for multiplication. Multiplication is also a major challenge when constructing MPC. SS has advanced to include verifiable secret sharing (VSS) and publicly verifiable secret sharing (pVSS). pVSS can be understood from a cryptographic perspective as a blockchain, but there is currently no mature solution.
The difficulty of completing digital signatures with MPC lies in how to use TSS to complete an asymmetric encryption.
Digital signatures:
In summary, MPC is a cryptographic technique that enables multiple parties to collaborate on a computation without revealing their private inputs. It is a crucial tool for achieving privacy-preserving distributed computation and can be applied to many fields, such as secure machine learning, secure computation outsourcing, and privacy-preserving data analysis. Note: this article is a translation and summary for easier reading of a Twitter thread by 0x30cF.