Introduction
Protocol
1.
Overview
2.
Notarization
2.1.
TLS Handshake
2.1.1.
Key Exchange
2.1.2.
Symmetric key derivation
2.2.
Encryption
2.3.
Commitment
2.3.1.
Commitment to public data
3.
Selective Disclosure
4.
Secure 2-Party Computation
4.1.
Garbled Circuits
4.1.1.
Dual Execution with Asymmetric Privacy
4.2.
Oblivious Transfer
4.3.
Paillier
4.4.
MAC
4.5.
Finite-Field Arithmetic
Light
Rust
Coal
Navy
Ayu (default)
tlsn-docs
Protocol