- What is the difference between a one-shot MPC protocol and an unbounded invocation of multiple MPC protocols?
- Would public key cryptography have been possible in World War II?
- Can cryptography help create tamper proof voting systems?
Ep.14- Different MPC Protocols, Throwback Cryptography, and Tamper-Proof Voting | Ask the Professor
In this all-new episode of our hit series, “Ask the Professor,” Prof. Nigel Smart answers the following questions: