mirror of https://github.com/nucypher/nucypher.git
png -> svg
parent
ec11b68a46
commit
864a5eeba9
Binary file not shown.
Before Width: | Height: | Size: 181 KiB |
File diff suppressed because one or more lines are too long
After Width: | Height: | Size: 16 KiB |
|
@ -26,8 +26,8 @@ Incorrect re-encryptions are detectable by Bob, who can then send a proof to the
|
|||
5. If any of the verifications fail, then Bob supplies the ciphertext and NIZK to the :ref:`Adjudicator contract <contracts>`. The contract examines Bob's claim by checking whether the NIZK proof for the ciphertext fails, leveraging `optimized ECC algorithms <https://github.com/nucypher/numerology>`_.
|
||||
6. If the invalidity of the cFrag is confirmed by the Adjudicator contract, the delivery of a faulty cFrag to Bob is ruled to be an official protocol violation. A penalty is computed and the owner of the offending Ursula has their stake immediately slashed by the penalty amount.
|
||||
|
||||
.. image:: ../.static/img/correctness_verification_schematic.png
|
||||
:target: ../.static/img/correctness_verification_schematic.png
|
||||
.. image:: ../.static/img/correctness_verification_schematic.svg
|
||||
:target: ../.static/img/correctness_verification_schematic.svg
|
||||
|
||||
Penalties
|
||||
---------
|
||||
|
|
Loading…
Reference in New Issue