png -> svg

pull/2038/head
arjunhassard 2020-05-28 10:23:14 -06:00
parent ec11b68a46
commit 864a5eeba9
3 changed files with 5 additions and 2 deletions

Binary file not shown.

Before

Width:  |  Height:  |  Size: 181 KiB

File diff suppressed because one or more lines are too long

After

Width:  |  Height:  |  Size: 16 KiB

View File

@ -26,8 +26,8 @@ Incorrect re-encryptions are detectable by Bob, who can then send a proof to the
5. If any of the verifications fail, then Bob supplies the ciphertext and NIZK to the :ref:`Adjudicator contract <contracts>`. The contract examines Bob's claim by checking whether the NIZK proof for the ciphertext fails, leveraging `optimized ECC algorithms <https://github.com/nucypher/numerology>`_.
6. If the invalidity of the cFrag is confirmed by the Adjudicator contract, the delivery of a faulty cFrag to Bob is ruled to be an official protocol violation. A penalty is computed and the owner of the offending Ursula has their stake immediately slashed by the penalty amount.
.. image:: ../.static/img/correctness_verification_schematic.png
:target: ../.static/img/correctness_verification_schematic.png
.. image:: ../.static/img/correctness_verification_schematic.svg
:target: ../.static/img/correctness_verification_schematic.svg
Penalties
---------