PKT Reading group 02-26-22

Rob's presentation

LS

  • phase 1: sequential setup using local randomness among each user
  • phase 2: randomness beacon to add additional randomness
  • each phase 1 step involves
    • using local entropy to generate private key
    • bunch of operations on two groups (G1, G2) that have a bilinear mapping
    • such that anyone else, given the public key, can verify that they were done correctly
  • operations are exponentiations (2^22-1). can be done in parallel (in powersoftau, chunking is based on #cores)

RB

My layman summary of this whole mpc thing: you end up with a set of public parameters for which

  1. You can independently verify are in the proper mathematical form for use in the cryptographic system and
  2. Can independently peform future transformations of the parameters which can then be independently verified by others and finally
  3. You can trust calculations on the chain as long as you trust that at least one of the secret keys remained secret
Select a repo