Been wondering about this harder version. If itās simple to state or link, would appreciate it.
I have a vague sense that n+1 txns using a polynomial would likely leak a key, but canāt see how a complex permutation of the scalar field could be cracked without knowing some properties about it. Quick google didnāt yield any results