linen
Results
2
comments of
linen
thank you for the reply! > Shamir-based protocols have to use GF(2^n) embeddings for binary computation, which makes edaBits less useful than in other settings. what is n in this...
Also, would that be possible to use in MP-SPDZ replicated secret sharing based protocols with more than 4 parties, in a way that is efficient?