Today Brian talked about secret sharing schemes.
I’ll cover threshold-based schemes, like Shamir’s, as well as some generalized constructions. I’ll also go over an application in secure multiparty computing.
Previous: Taking the Derivative of a Type
Ohad presented on type stuff (like taking the derivative of a type).
continue reading ❯