Introduction to Beaver Triples

이 글은 비버 트리플(Beaver Triples)을 활용한 비밀 분할 계산 방식을 소개한다. 친구들이 각자 식당에 대한 선호도와 지불 가능 금액을 비밀로 유지하면서도, 그룹 전체 점수를 안전하게 계산하는 문제를 다룬다. 비버 트리플은 두 비밀 공유 값의 곱셈을 다항식 차수를 증가시키지 않고 수행할 수 있게 해주며, 이를 통해 최소한의 참여자만으로 최종 결과를 공개할 수 있다. 이 방법은 랜덤 마스크를 사용해 개인 정보를 보호하면서 곱셈 연산을 가능하게 하는 핵심 기법이다. 실제 예시로 4명의 친구가 3개 식당 점수를 계산하는 과정을 상세히 설명한다.

https://stoffelmpc.com/stoffel-blog/beaver-triples-tuples

#securemultipartycomputation #secretsharing #beavertriples #privacy #multiplicationprotocol

Computing with Secret Shares - Introducing Beaver Triples - Stoffel - MPC Made Simple | Privacy-First Application Development

Ship features that can't leak user data—even in a breach. Stoffel's secure multiparty computation (MPC) platform lets you compute on encrypted inputs. Math-backed privacy, not promises.

You can now do Shamir's secret sharing in Hare and use it as a module or just install the CLI.

https://git.sr.ht/~blainsmith/hare-shamir-secret-sharing

Disclaimer: This has not been formerly audited so use at your own risk.

#Cryptography #SecretSharing #HareLang

What is Multi-Party Computation?

We know how to secure data in storage using E2EE, but is it possible to ensure data privacy even while processing it server-side? This is the first in a series of articles Privacy Guides team member @fria be publishing, covering the privacy-enhancing technologies being rolled out in various products.

https://www.privacyguides.org/articles/2025/09/15/multi-party-computation/

#MultiPartyComputation #Encryption #Security #Privacy #MPC #MentalPoker #SecretSharing #Article #PrivacyGuides

What is Multi-Party Computation?

Learn about Secure Multi-Party Computation and how it can be used to solve real-world privacy problems.

Privacy Guides

@eliasp

Ich habe den Blog-Beitrag über das Problem #DigitalerNachlass bzw. #SecretSharing nochmal etwas überarbeitet.

https://cknoll.github.io/sicherer-digitaler-nachlass-flexible-secret-sharing.html

Mich würde interessieren, was technisch versierte Menschen mit dem für das Thema erforderlichen Weitblick (z.B. @jssfr @HackerGeno @fsfw-dresden.de @bits_und_baeume) dazu sagen.

(Bezug zu Nachhaltigkeit und #BitsUndBaeume ganz unten im Blog-Post.)

blog:cknoll · Sicherer digitaler Nachlass ("flexible secret sharing")

@eliasp @cubicroot @citizenK4te @ueckueck
@tropf

Ich habe über das Problem #DigitalerNachlass nochmal nachgedacht: Ein Programm wie gfshare ist ein Anfang aber für die Praxis zu unflexibel. Soziale Beziehungen ändern sich nunmal und dem sollte das Prinzip #SecretSharing Rechnung tragen.

Ideen (und offene Fragen) dazu hier:

https://cknoll.github.io/sicherer-digitaler-nachlass-flexible-secret-sharing.html

blog:cknoll · Sicherer digitaler Nachlass ("flexible secret sharing")

Reference implementation of Shamir's Secret Sharing

Is there an implementation of Shamir's Secret Sharing that can be regarded as "canonical" (or "reference" or "standard") implementation, so that I can test other

Cryptography Stack Exchange
Solving Shamir secret sharing schemes

I have been working through the introduction to cryptography with coding theory book and have just come across Shamir secret sharing questions. However I just don't quite think I'm understanding it

Cryptography Stack Exchange