Weikeng Chen

Results 288 comments of Weikeng Chen

Nope? Because the one that may need cloning is `ConstraintSynthesizer` rather than `ConstraintSystemRef`.

I agree. We should add a `Verifier` mode. This is useful in general. As for the two optimizations, we feel they are not very crucial for now---but surely good to...

That said, it is better that we still leave an interface for one to run the verifier with a list of field elements, for compatibility and for use cases where...

A separate proposal would be to avoid the generation of too many symbolic LC. Currently, each AllocatedFp is associated with a Variable in the constraint system. Thus, mul_by_constant and add...

I feel the `Ref` part is still meaningful, as it conveys a meaning that this is just a reference so feel free to clone. "Builder" seems to be something that...

The example in #66 considers 12345 bools. I can't help but do an experiment for 12345. The original version: ``` OT time: 0.643174 s Total time: 255.182363 s ``` The...

I don't think we call it OI protocol. By the way, what does OI means here? I think you are referring to RAM-model secure computation. You can find relevant work...

Thanks for the ideas. Great ideas! To sum up, - encryption is only needed for `reveal` (but not the OT & circuit), as long as the program doesn't do crazy...

I mean man-in-the-middle. Where is the protection that "Malicious bit flips" will be detected?

What if the "bit flips" happen in the sending/receiving of garbled gates? I mean, one party already receives incorrect "half-gates".