Hacker News new | past | comments | ask | show | jobs | submit login

My point was different; you can compute a hash (or any other deterministic computation) trustlessly by having multiple independent parties compute it separately and then checking if the result is the same.

You cannot necessarily do the same for nondeterministic computations in general. In this case you can easily verify that the signature is valid, but unless you control the rando parameters you cannot verify that a few bits of entropy have been exfiltrated by one or more parties in the computation.

In the simplest case you could with statistical methods but not with slightly more sophisticated attacks.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: