Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Essentially the hash of the round number is the encryption key and the randomness that gets generated at that round number (in the future) is the decryption key


Almost, the randomness is generated using a BLS signature that also makes it verifiable. And that signature is the decryption key.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: