Zero Knowledge cover image

Cutting Edge ZK Research with Mary Maller

Zero Knowledge

00:00

A Different Type of Secret Key Is Shared at Eff

For a threshold system thes sort of two things that you need. One is the public key, which you would be generally verifying your random beacon output against. The other would be the secret key being that you do actually want people to be able to compute the random beacon output if they co operate. And shoring the secret key is also something which you need to do during the trusted set up process,. So it has few, let's say, popular uses and one money is that we've just said these er in the mikan. But there are other uses that people have been talking about. For example, threshold signatures and threshold incription. There's not that much prior work on specifically

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app