From 7d3d849474c1f408859d19d7f3f4be952c1c00d1 Mon Sep 17 00:00:00 2001 From: Jonah Aragon Date: Mon, 15 Sep 2025 12:33:36 -0500 Subject: [PATCH] update(blog): Upload "Mental Poker Animation" --- blog/posts/multi-party-computation.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/blog/posts/multi-party-computation.md b/blog/posts/multi-party-computation.md index 87fceac54..b2e450f46 100644 --- a/blog/posts/multi-party-computation.md +++ b/blog/posts/multi-party-computation.md @@ -24,6 +24,8 @@ In a seminal [paper](https://dspace.mit.edu/bitstream/handle/1721.1/148953/MIT-L To explain, fan favorites Alice and Bob will make a return. First, Bob encrypts all the cards with his key, then sends them to Alice. Alice picks five to deal back to Bob as his hand, then encrypts five with her own key and sends those to Bob as well. Bob removes his encryption from all ten cards and sends Alice's cards back to her. +
+ Notice that Bob needs to be able to remove his encryption *after* Alice has applied hers. This commutative property is important for the scheme to work. This early scheme is highly specialized for this task and not applicable to different situations.