Oblivious pseudorandom function: Difference between revisions

Content deleted Content added
m Sample OPRF Protocol: fixed wrong variable name in client code
m Sample OPRF Protocol: added link to modular inverse and fixed spelling error
Line 78:
Notes:
 
The client computes the [[Modular_multiplicative_inverse|multiplicative inverse]] of the blinding factor. This enables it to reverse the affecteffect of the blinding factor on the result, and obtain the result the server would have returned had the client not blinded the input.
 
As a final step, to complete the OPRF, the client performs a [[Cryptographic_hash_function|one-way hash]] on the result to ensure the OPRF output is [[Discrete_uniform_distribution|uniform]], completely [[pseudorandom]], and non-invertible.