You don't actually do it through polynomial interpolation or do you? Because it sort of looks like, yeah, you do. But these, the secret sharing, it's like the data is broken up, but when you combine it, it becomes the full piece of data. I mean,you can always see any random, any arbitrary number of bits as a number,. It depends on how you interpret things.
In this week's episode, Anna and Fredrik give a general introduction to MPCs, go over a few examples of MPCs in action, compare them with other cryptographic concepts, try to pronounce "fully homomorphic encryption" properly, and more!
Here are some of the material that we reference:
Thanks again to this week's sponsor Aragon.
To find out more about Aracon, the first Aragon community conference happening on January 29-30th in Berlin visit aracon.one
To the listeners of Zero Knowledge Podcast, if you like what we do:
Follow us on Twitter - @zeroknowledgefm
Join us on Telegram - https://t.me/joinchat/B_81tQ57-ThZg8yOSx5gjA
Support us on Patreon - https://www.patreon.com/zeroknowledge
Or directly here:
ETH: 0xC0FFEE1B5083230a5154F55f253B6b6ae8F29B1a
BTC: 1cafekGa3podM4fBxPSQc6RCEXQNTK8Zz