Bell Curve cover image

Shining A Light On MEV | Tarun Chitra, Justin Drake

Bell Curve

00:00

How to Decrypt a Cryptocurrency Key

The decryption key should be outside of the user's control. There are a few flavors at play here, specifically what's called delay encryption. The other flavor for encrypted mempos is to use basically a committee with a threshold assumption. And then there's this final really awesome flavor which generalizes all the forms of the decryption with guaranteed output known as witness encryption. Turunova: Today we need an centralized operator that can supply privacy in MEV because without it it just doesn't work today.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app