Today Brian talked about secret sharing schemes.

I’ll cover threshold-based schemes, like Shamir’s, as well as some generalized constructions. I’ll also go over an application in secure multiparty computing.

Previous: Taking the Derivative of a Type

Ohad presented on type stuff (like taking the derivative of a type).

continue reading ❯