Fix Typos and Improve Clarity in Circom-MPC and TLSNotary Articles (#467)

* Update circom-mpc-tldr-and-retrospective.md

* Update tlsnotary-updates.md
This commit is contained in:
Maxim Evtush
2025-06-16 09:26:23 +03:00
committed by GitHub
parent 5454107630
commit 1866c24304
2 changed files with 2 additions and 2 deletions

View File

@@ -78,7 +78,7 @@ In what follows, we present work that enables the use of Circom as a front-end l
![](/articles/circom-mpc-tldr-and-retrospective/Pu6FYJqTnT4r478Ydn_u0.webp)
_[Detailed explanation of Progammable-MPC with Circom-MPC.](https://docs.google.com/presentation/d/1dPvNyrBWyqyX2oTGcnM52ldpISGrhwEhIZXJPwYWE6I/edit#slide=id.g2818c557dad_0_261)_
_[Detailed explanation of Programmable-MPC with Circom-MPC.](https://docs.google.com/presentation/d/1dPvNyrBWyqyX2oTGcnM52ldpISGrhwEhIZXJPwYWE6I/edit#slide=id.g2818c557dad_0_261)_
The Circom-MPC project aims to allow a developer to write a Circom program (a Circom circuit) and run it using an MPC backend.

View File

@@ -120,7 +120,7 @@ For our needs, we implemented a novel\* variant of so-called Dual Execution, whi
The jist of it is this: During the TLS session one party, the Prover, acts as the Garbler while also committing to their inputs prior to learning the output of the circuit. Later, these commitments are used to prove the Prover acted honestly (or at least leakage was statistically bounded), and aborting otherwise.
Some key take aways of this approach:
Some key take away of this approach:
- Garbled circuits on their own are secure against a malicious evaluator. The Verifier, acting as the evaluator, can not cheat or otherwise corrupt the output without detection. This ensures the privacy and integrity of the data to the Prover during the TLS session.
- In the final phase of DEAP the Verifier opens all their inputs to the Prover. This allows the Prover to check the Verifier has behaved honestly and ensures _no leakage_ of the private data, contrary to the leakage inherent in the equality check of standard Dual Execution.