emp-ag2pc
emp-ag2pc copied to clipboard
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
_Disclaimer ! !_ I couldn't find a documenation for the toolkit library EMP-tool and the emp-ag2pc only has a paper (which I am currently still reading). Because of a lack...
It seems like these loops: https://github.com/emp-toolkit/emp-ag2pc/blob/19751229d79deccfcf5f8d3a97a15d3dee4b917a/emp-ag2pc/fpre.h#L314 https://github.com/emp-toolkit/emp-ag2pc/blob/19751229d79deccfcf5f8d3a97a15d3dee4b917a/emp-ag2pc/fpre.h#L327 Iterate starting from 1. Is this intentional? Given that the whole array is sent later, this means that an uninitialised value gets written,...
If one sets ```__debug``` in ```amortized_2pc.h``` then the code doesn't compile. This is because variables like ```value``` aren't defined in the class anymore.
Many (even combinational) circuits have efficient descriptions, but become impracticable when they have to be "flattened" or unrolled. This is discussed in detail in e.g. [[KMsB13]](https://www.cise.ufl.edu/~butler/pubs/sec13b.pdf) and [[SHSSK15]](https://encrypto.de/papers/SHSSK15.pdf). The [Bristol...
When using Bristol circuits, Alice's input actually corresponds to the 2nd party while Bob the first. This flip of order is really confusing. If it's intended, it better be clearly...