You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<p>Instead of every single validator carrying out the work of decryption, a well-provisioned helper can do the work once and broadcast hints to the network which will be used to quickly verify the result.</p>
@@ -160,13 +160,13 @@ <h3><a href="/blogs/pyramid-mmb.html">Honey, I Shrunk the Proofs!</a></h3>
160
160
<p>By combining an active-region-aware bagging policy, pyramid bagging, with the Merkle Mountain Belt (MMB), our new scheme makes active-value proofs small and predictable: within two digests of a balanced binary Merkle tree over those values (without sacrificing append-only updates).</p>
<p>A threshold encryption scheme is a cryptographic primitive that allows users to encrypt messages to a committee of n parties such that any t out of n members can non-interactively decrypt the message.</p>
167
167
<h3><ahref="/blogs/batch-pari.html">The Proof is in the Pairing</a></h3>
<p>Blockchains are especially well-suited for two use cases: payments and trading. We've made real progress in scaling these systems with many chains supporting 10K-100K TPS. But what happens when we introduce privacy?</p>
0 commit comments