From bc9fdcf66471f90071a5d059ca5cd2faba18fc91 Mon Sep 17 00:00:00 2001 From: oskarth Date: Fri, 4 Nov 2022 10:46:24 +0800 Subject: [PATCH] Tweaks --- .../2022-11-02-building-privacy-protecting-infrastructure.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/research/2022-11-02-building-privacy-protecting-infrastructure.md b/research/2022-11-02-building-privacy-protecting-infrastructure.md index fbdd8f0..d9e59a9 100644 --- a/research/2022-11-02-building-privacy-protecting-infrastructure.md +++ b/research/2022-11-02-building-privacy-protecting-infrastructure.md @@ -252,7 +252,7 @@ is a share of the secret equation, and the (internal) nullifier acts as a unique fingerprint for a given app/user/epoch combination. How do we calculate `y` and the internal nullifier? -```circom +``` // Private input signal input identity_secret; signal input path_elements[n_levels][1]; @@ -269,8 +269,6 @@ signal output root; signal output nullifier; ``` - - ### RLN - Shamir's secret sharing This is done using [Shamir's secret