Multi-Party Secure Computing.
-
#Implementing a MACI Anonymization Scheme with 2-of-2 Multi-Party Secure Computing
On April 1st, the Dora Factory community published an article on the Dora Research Blog, demonstrating the specific implementation of a MACI anonymization schem
-
Implementation of a MACI Anonymization Scheme Based on Multi-Party Secure Computing
On April 1st, the Dora Factory community published an article on the Dora Research Blog, demonstrating the specific implementation of a MACI anonymization scheme based on 2-of-2 mu