🔥 【ETF 杠杆代币交易嘉年华】火热进行中!总奖池 $100,000,单人最高 $5,000
📅 活动时间:2025/06/16 08:00 - 2025/07/02 08:00(UTC+8)
⏳ 倒计时:仅剩 7天,速来参与!
🚀 活动一:新用户专属奖池 20,000 USDT
✅ 新手福利:活动期间,首次交易任意一笔 ETF,立领 5 USDT
✅ 进阶奖励:ETF 交易量 满 500 USDT,再领 5 USDT
💸 活动二:交易激励奖池 80,000 USDT
🏆 交易越多,奖励越高!单人最高奖励 $5,000
📢 立即行动,锁定收益
👉 立即参与:https://www.gate.com/campaigns/1180
#ETF交易 # #杠杆代币#
MPC and Blockchain Cryptography: A Deep Dive
Multiparty computation (MPC) and blockchain are both distributed systems. This article serves as a learning note (a directory entry) on cryptography, MPC, and blockchain.
Symmetric encryption, asymmetric encryption, and hash functions basically constitute all levels of cryptographic algorithms.
Cryptographic protocols include:
A key concept in MPC is simulation, which means bringing the hypothetical world of the ideal into the real world (especially with regard to trust). Six important characteristics that need to be considered are:
Based on different levels of untrustworthiness, there are several security models in cryptography:
Garbled circuits (GC) and oblivious transfer (OT) are two protocols that are suitable for logical operations but not arithmetic operations. They are mostly studied between two parties rather than multiple parties (although many people are researching how to convert 2PC into MPC).
The bottom-level technology of MPC is secret sharing (SS), which essentially involves taking some points to fit a curve. It is more suitable for linear operations such as addition, but not for multiplication. Multiplication is also a major challenge when constructing MPC. SS has advanced to include verifiable secret sharing (VSS) and publicly verifiable secret sharing (pVSS). pVSS can be understood from a cryptographic perspective as a blockchain, but there is currently no mature solution.
The difficulty of completing digital signatures with MPC lies in how to use TSS to complete an asymmetric encryption.
Digital signatures:
In summary, MPC is a cryptographic technique that enables multiple parties to collaborate on a computation without revealing their private inputs. It is a crucial tool for achieving privacy-preserving distributed computation and can be applied to many fields, such as secure machine learning, secure computation outsourcing, and privacy-preserving data analysis. Note: this article is a translation and summary for easier reading of a Twitter thread by 0x30cF.