Fix several typos in the espresso-sequencer-paper.pdf
I listed below some typos I found in the documentation.
pag 3
from
Instead, it suffices that a sequencer guarantee only availability of transaction data, meaning this data can be retrieved in the future by anyone who needs it.
to
Instead, it suffices that a sequencer guarantees only the availability of transaction data, meaning this data can be retrieved in the future by anyone who needs it.
pag 4
from
The idea is to hide the elected committee until they published their votes
to
The idea is to hide the elected committee until they publish their votes
pag 4
from
HotShot also uses a heterogenous infrastructure at the network layer to provide us with a key performance advantage compared to other BFT systems
to
HotShot also uses a heterogeneous
infrastructure at the network layer to provide us with a key performance advantage compared to other BFT systems
pag 5
from
At the base, the Saviadori layer, uses a newly-introduced variant of the verifiable information dispersal scheme from [11] to gurantee data availability.
to
At the base, the Saviadori layer, uses a newly-introduced variant of the verifiable information dispersal scheme from [11] to guarantee data availability.
pag 7
from
The dissemination of the full block to clients (e.g., the rollup provers) does not necessarily complete even if the block has already been finalized, and only a minimally necessary bandwidth is used to ensure data availability on the critical path
to
The dissemination of the full block to clients (e.g., the rollup provers) is not necessarily complete even if the block has already been finalized, and only a minimally necessary bandwidth is used to ensure data availability on the critical path
pag 7
from
A common approach to adapt a permissioned protocol to the proof-ofstake setting is to elect a small random committee that represents the entire set of stakers and run consensus among the committee members.
to
A common approach to adapt a permissioned protocol to the proof-of-stake setting is to elect a small random committee that represents the entire set of stakers and run consensus among the committee members.
pag 22
from
A centralized CDN might be an easy target for an attacker, or it could experience occassional downtime even in the absence of any malicious actor
to
A centralized CDN might be an easy target for an attacker, or it could experience occasional downtime even in the absence of any malicious actor
pag 23
from
There are three types of storage nodes: oridnary storage nodes (Savoiardi), the small DA committee nodes (Marscapone), and the content delivery network (CDN) node (Cocoa).
to
There are three types of storage nodes: ordinary storage nodes (Savoiardi), the small DA committee nodes (Marscapone), and the content delivery network (CDN) node (Cocoa). Block sender
pag 24
from
Respond to the block sender with a signed attestetion of C
to
Respond to the block sender with a signed attestation of C
Fix several typos in the espresso-sequencer-paper.pdf
I listed below some typos I found in the documentation.
pag 3
from Instead, it suffices that a sequencer
guaranteeonlyavailabilityof transaction data, meaning this data can be retrieved in the future by anyone who needs it. to Instead, it suffices that a sequencer guarantees only the availability of transaction data, meaning this data can be retrieved in the future by anyone who needs it.pag 4
from The idea is to hide the elected committee until they
publishedtheir votes to The idea is to hide the elected committee until they publish their votespag 4
from HotShot also uses a
heterogenousinfrastructure at the network layer to provide us with a key performance advantage compared to other BFT systems to HotShot also uses a heterogeneous infrastructure at the network layer to provide us with a key performance advantage compared to other BFT systemspag 5
from At the base, the Saviadori layer, uses a newly-introduced variant of the verifiable information dispersal scheme from [11] to
guranteedata availability. to At the base, the Saviadori layer, uses a newly-introduced variant of the verifiable information dispersal scheme from [11] to guarantee data availability.pag 7
from The dissemination of the full block to clients (e.g., the rollup provers)
doesnot necessarily complete even if the block has already been finalized, and only a minimally necessary bandwidth is used to ensure data availability on the critical path to The dissemination of the full block to clients (e.g., the rollup provers) is not necessarily complete even if the block has already been finalized, and only a minimally necessary bandwidth is used to ensure data availability on the critical pathpag 7
from A common approach to adapt a permissioned protocol to the
proof-ofstakesetting is to elect a small random committee that represents the entire set of stakers and run consensus among the committee members. to A common approach to adapt a permissioned protocol to the proof-of-stake setting is to elect a small random committee that represents the entire set of stakers and run consensus among the committee members.pag 22
from A centralized CDN might be an easy target for an attacker, or it could experience
occassionaldowntime even in the absence of any malicious actor to A centralized CDN might be an easy target for an attacker, or it could experience occasional downtime even in the absence of any malicious actorpag 23
from There are three types of storage nodes:
oridnarystorage nodes (Savoiardi), the small DA committee nodes (Marscapone), and the content delivery network (CDN) node (Cocoa). to There are three types of storage nodes: ordinary storage nodes (Savoiardi), the small DA committee nodes (Marscapone), and the content delivery network (CDN) node (Cocoa). Block senderpag 24
from Respond to the block sender with a signed
attestetionof C to Respond to the block sender with a signed attestation of C