linen

Results 2 comments of linen

thank you for the reply! > Shamir-based protocols have to use GF(2^n) embeddings for binary computation, which makes edaBits less useful than in other settings. what is n in this...

Also, would that be possible to use in MP-SPDZ replicated secret sharing based protocols with more than 4 parties, in a way that is efficient?