List of Flash News about MPC
| Time | Details |
|---|---|
|
2025-11-03 10:04 |
Solana (SOL) Next-Gen Privacy: GhostWare Unifies Zero-Knowledge, Confidential Transactions, and MPC for Default-Private dApps — Key Trading Takeaways
According to @PANewsCN, GhostWare is a privacy operating system on Solana that integrates zero-knowledge proofs, confidential transactions, and secure multi-party computation to deliver default privacy with decentralization, supporting anonymous identity and private computation, source: PANews https://www.panewslab.com/zh/articles/e7d364d2-bdcb-4c92-91f6-3e6e840662c2 and https://twitter.com/PANewsCN/status/1985286906150523124. For SOL-focused traders, the development indicates a dedicated privacy stack emerging on Solana that enables anonymous identities and privacy computation for dApps, making it relevant to monitor GhostWare-driven deployments and ecosystem integrations to gauge potential shifts in on-chain activity, source: PANews https://www.panewslab.com/zh/articles/e7d364d2-bdcb-4c92-91f6-3e6e840662c2. The cited post highlights the technical design and, in the provided excerpt, does not include token listing details, pricing, or launch timelines; traders should reference official GhostWare and Solana ecosystem updates before making decisions, source: PANews https://twitter.com/PANewsCN/status/1985286906150523124. |
|
2024-08-27 13:41 |
Vitalik Buterin Explains MPC and 2PC in Crypto Security
According to Vitalik Buterin, Multi-Party Computation (MPC) typically operates as N/2-of-N or N/3 or 2N/3, involving a committee trusted by a large user base. In contrast, Two-Party Computation (2PC) involves two parties combining their private inputs in a trustless manner, ensuring that neither party can extract the other's data. This distinction is crucial for understanding different security models in cryptocurrency transactions. |
|
2024-08-27 13:41 |
Vitalik Buterin Explains MPC and 2PC in Crypto
According to Vitalik Buterin, Multi-Party Computation (MPC) in practice typically operates as N/2-of-N, N/3, or 2N/3. This involves a trusted committee shared across a large user base. In contrast, Two-Party Computation (2PC) involves two parties combining their private inputs in a trustless manner, ensuring that neither party can extract the other's data. |