Weikeng Chen
Weikeng Chen
Nope? Because the one that may need cloning is `ConstraintSynthesizer` rather than `ConstraintSystemRef`.
I agree. We should add a `Verifier` mode. This is useful in general. As for the two optimizations, we feel they are not very crucial for now---but surely good to...
That said, it is better that we still leave an interface for one to run the verifier with a list of field elements, for compatibility and for use cases where...
A separate proposal would be to avoid the generation of too many symbolic LC. Currently, each AllocatedFp is associated with a Variable in the constraint system. Thus, mul_by_constant and add...
I feel the `Ref` part is still meaningful, as it conveys a meaning that this is just a reference so feel free to clone. "Builder" seems to be something that...
The example in #66 considers 12345 bools. I can't help but do an experiment for 12345. The original version: ``` OT time: 0.643174 s Total time: 255.182363 s ``` The...
I don't think we call it OI protocol. By the way, what does OI means here? I think you are referring to RAM-model secure computation. You can find relevant work...
Thanks for the ideas. Great ideas! To sum up, - encryption is only needed for `reveal` (but not the OT & circuit), as long as the program doesn't do crazy...
I mean man-in-the-middle. Where is the protection that "Malicious bit flips" will be detected?
What if the "bit flips" happen in the sending/receiving of garbled gates? I mean, one party already receives incorrect "half-gates".