Content deleted Content added
Jasonkresch (talk | contribs) m →Sample OPRF Protocol: removed space from pseudocode |
Jasonkresch (talk | contribs) m Added link for quantum attacks |
||
Line 70:
// Unblind the response to produce the result
ECPoint result = ECMultiply(serverResponse,
// Hash the unblinded result to complete OPRF calculation
Line 104:
Because the elliptic curve point multiplication is computationally difficult to invert (like the [[discrete logarithm]] problem, the client cannot feasibly learn the server's secret from the response it produces.
Note, however, that this function is vulnerable to [[
==== RSA Blind Signatures ====
|