Skip to content

Commit 1866c24

Browse files
authored
Fix Typos and Improve Clarity in Circom-MPC and TLSNotary Articles (#467)
* Update circom-mpc-tldr-and-retrospective.md * Update tlsnotary-updates.md
1 parent 5454107 commit 1866c24

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

content/articles/circom-mpc-tldr-and-retrospective.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ In what follows, we present work that enables the use of Circom as a front-end l
7878

7979
![](/articles/circom-mpc-tldr-and-retrospective/Pu6FYJqTnT4r478Ydn_u0.webp)
8080

81-
_[Detailed explanation of Progammable-MPC with Circom-MPC.](https://docs.google.com/presentation/d/1dPvNyrBWyqyX2oTGcnM52ldpISGrhwEhIZXJPwYWE6I/edit#slide=id.g2818c557dad_0_261)_
81+
_[Detailed explanation of Programmable-MPC with Circom-MPC.](https://docs.google.com/presentation/d/1dPvNyrBWyqyX2oTGcnM52ldpISGrhwEhIZXJPwYWE6I/edit#slide=id.g2818c557dad_0_261)_
8282

8383
The Circom-MPC project aims to allow a developer to write a Circom program (a Circom circuit) and run it using an MPC backend.
8484

content/articles/tlsnotary-updates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ For our needs, we implemented a novel\* variant of so-called Dual Execution, whi
120120

121121
The jist of it is this: During the TLS session one party, the Prover, acts as the Garbler while also committing to their inputs prior to learning the output of the circuit. Later, these commitments are used to prove the Prover acted honestly (or at least leakage was statistically bounded), and aborting otherwise.
122122

123-
Some key take aways of this approach:
123+
Some key take away of this approach:
124124

125125
- Garbled circuits on their own are secure against a malicious evaluator. The Verifier, acting as the evaluator, can not cheat or otherwise corrupt the output without detection. This ensures the privacy and integrity of the data to the Prover during the TLS session.
126126
- In the final phase of DEAP the Verifier opens all their inputs to the Prover. This allows the Prover to check the Verifier has behaved honestly and ensures _no leakage_ of the private data, contrary to the leakage inherent in the equality check of standard Dual Execution.

0 commit comments

Comments
 (0)