1. Introduction
  2. Protocol
  3. 1. Overview
  4. 2. Notarization
    1. 2.1. TLS Handshake
      1. 2.1.1. Key Exchange
      2. 2.1.2. Symmetric key derivation
    2. 2.2. Encryption
    3. 2.3. Commitment
      1. 2.3.1. Commitment to public data
  5. 3. Selective Disclosure
  6. 4. Secure 2-Party Computation
    1. 4.1. Garbled Circuits
      1. 4.1.1. Dual Execution with Asymmetric Privacy
    2. 4.2. Oblivious Transfer
    3. 4.3. Paillier
    4. 4.4. MAC
    5. 4.5. Finite-Field Arithmetic

tlsn-docs

Secure 2-Party Computation