Matthew Green on Nostr: This is done by embedding all the logic that processes secret keys into a “garbled ...
This is done by embedding all the logic that processes secret keys into a “garbled circuit” within the ciphertext. The garbled circuit can compute the functions itself. What’s crazy is that this only happens in the security proof. In the real protocol none of this logic exists.
Published at
2023-11-12 18:38:15Event JSON
{
"id": "aa6cff9b081d10d22ec42ed206ecc12673376d609ef92344f9d141318f1744b1",
"pubkey": "5c06f588380197da5dfbe2e32928b9b6d82c62dac0c602535a09ee1cad5a8221",
"created_at": 1699814295,
"kind": 1,
"tags": [
[
"e",
"13e0f1c2ae5428fdc2d41e5930d23511d9606c12a337f3c395d5300e26c5c333",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://ioc.exchange/users/matthew_d_green/statuses/111399029686154391",
"activitypub"
]
],
"content": "This is done by embedding all the logic that processes secret keys into a “garbled circuit” within the ciphertext. The garbled circuit can compute the functions itself. What’s crazy is that this only happens in the security proof. In the real protocol none of this logic exists.",
"sig": "281aa41aa4f51fb87ec0b687d250891ee5b5ab4e48a9f7f3b174f2d815cf6ef8e9a53623a88891df23a24bc0869a6e1cb71cdb741b5bc37fd4d035209d8419be"
}