Claudio Orlandi [EMAIL PROTECTED] writes:
Converting this simple protocol to the active case is harder than
expected, and I'm working on it right now.
Great, I'm looking forward to it! :-)
Well, if you have a lot of spare time you can start some
preprocessing :)
Well, what are weekends
Cool -- that sounds like a good opportunity to finally sit down and
create a slow-but-simple elliptic curve library for VIFF.
I suggest you to use some library instead. Some of the algorithms are
quite involved...
I'm sure you can find C/C++ good stuff out there, and as far as I
understood, you
Quoting Claudio Orlandi [EMAIL PROTECTED]:
Cool -- that sounds like a good opportunity to finally sit down and
create a slow-but-simple elliptic curve library for VIFF.
I suggest you to use some library instead. Some of the algorithms are
quite involved...
I'm sure you can find C/C++ good
Ivan Bjerre Damgaard [EMAIL PROTECTED] writes:
Quoting Claudio Orlandi [EMAIL PROTECTED]:
Cool -- that sounds like a good opportunity to finally sit down
and create a slow-but-simple elliptic curve library for VIFF.
I suggest you to use some library instead. Some of the algorithms
are
Claudio Orlandi [EMAIL PROTECTED] writes:
Hi Claudio
if you are interested just in passive security for the 2 party case
you can implement the following protocol for multiplication.
Excellent, thank you! I'm basically interested in anything we can come
up with :-)
I have posted an