🔥 【ETF 槓杆代幣交易嘉年華】火熱進行中!總獎池 $100,000,單人最高 $5,000
📅 活動時間:2025/06/16 08:00 - 2025/07/02 08:00(UTC+8)
⏳ 倒計時:僅剩 7天,速來參與!
🚀 活動一:新用戶專屬獎池 20,000 USDT
✅ 新手福利:活動期間,首次交易任意一筆 ETF,立領 5 USDT
✅ 進階獎勵:ETF 交易量 滿 500 USDT,再領 5 USDT
💸 活動二:交易激勵獎池 80,000 USDT
🏆 交易越多,獎勵越高!單人最高獎勵 $5,000
📢 立即行動,鎖定收益
👉 立即參與:https://www.gate.com/campaigns/1180
#ETF交易 # #杠杆代币#
MPC and Blockchain Cryptography: A Deep Dive
Multiparty computation (MPC) and blockchain are both distributed systems. This article serves as a learning note (a directory entry) on cryptography, MPC, and blockchain.
Symmetric encryption, asymmetric encryption, and hash functions basically constitute all levels of cryptographic algorithms.
Cryptographic protocols include:
A key concept in MPC is simulation, which means bringing the hypothetical world of the ideal into the real world (especially with regard to trust). Six important characteristics that need to be considered are:
Based on different levels of untrustworthiness, there are several security models in cryptography:
Garbled circuits (GC) and oblivious transfer (OT) are two protocols that are suitable for logical operations but not arithmetic operations. They are mostly studied between two parties rather than multiple parties (although many people are researching how to convert 2PC into MPC).
The bottom-level technology of MPC is secret sharing (SS), which essentially involves taking some points to fit a curve. It is more suitable for linear operations such as addition, but not for multiplication. Multiplication is also a major challenge when constructing MPC. SS has advanced to include verifiable secret sharing (VSS) and publicly verifiable secret sharing (pVSS). pVSS can be understood from a cryptographic perspective as a blockchain, but there is currently no mature solution.
The difficulty of completing digital signatures with MPC lies in how to use TSS to complete an asymmetric encryption.
Digital signatures:
In summary, MPC is a cryptographic technique that enables multiple parties to collaborate on a computation without revealing their private inputs. It is a crucial tool for achieving privacy-preserving distributed computation and can be applied to many fields, such as secure machine learning, secure computation outsourcing, and privacy-preserving data analysis. Note: this article is a translation and summary for easier reading of a Twitter thread by 0x30cF.