Skip to content

Commit

Permalink
Merge pull request sec-bit#6 from xingzhibo2019/master
Browse files Browse the repository at this point in the history
  • Loading branch information
10to4 authored Sep 5, 2022
2 parents 2398fa3 + d7558e9 commit 3bff37c
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion zkp-intro/4/zkp-rom.md
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ Wait ……,协议交互不是只有两方吗? Alice 和 Bob,哪来第三

我们再看一下老朋友——Schnorr 协议,它是一个三步协议:第一步,Alice 发送一个承诺,然后第二步 Bob 发送随机数挑战,第三步,Alice 回应挑战。

![](https://github.com/sec-bit/learning-zkp/blob/master/zkp-intro/4/img/schnorr.png)
![](img/schnorr.png)

我们来看,如何把一个三步的 Schnorr 协议变成一步。

Expand Down
2 changes: 1 addition & 1 deletion zkp-intro/5/zkp-crs.md
Original file line number Diff line number Diff line change
Expand Up @@ -163,7 +163,7 @@ Jens Groth 在 2010 年基于 KEA(Knowledge of Exponent Assumption) 假设

- 第一步:
- Alice 随机选择一个「置换」,`Perm(.)`,并且通过`C`构造一个哈密尔顿环路子图 `C'=Perm(C)`
- 然后 Alice 加密 `C'`的每一个单元,把解密后的结果发送给 Bob。
- 然后 Alice 加密 `C'`的每一个单元,把加密后的结果发送给 Bob。

- 第二步:Bob 随机选择 `b in {0, 1}`进行挑战

Expand Down

0 comments on commit 3bff37c

Please sign in to comment.