EspressoSystems / HotShot

http://hotshot.docs.espressosys.com/
MIT License
123 stars 32 forks source link

[espresso-sequencer-paper.pdf] Fix several typos in the documentation #1997

Open tudorpintea999 opened 1 year ago

tudorpintea999 commented 1 year ago

Fix several typos in the espresso-sequencer-paper.pdf

I listed below some typos I found in the documentation.

pag 3

from Instead, it suffices that a sequencer guarantee only availability of transaction data, meaning this data can be retrieved in the future by anyone who needs it. to Instead, it suffices that a sequencer guarantees only the availability of transaction data, meaning this data can be retrieved in the future by anyone who needs it.    

pag 4

from The idea is to hide the elected committee until they published their votes to The idea is to hide the elected committee until they publish their votes  

pag 4

from HotShot also uses a heterogenous infrastructure at the network layer to provide us with a key performance advantage compared to other BFT systems to HotShot also uses a heterogeneous infrastructure at the network layer to provide us with a key performance advantage compared to other BFT systems  

 pag 5

from At the base, the Saviadori layer, uses a newly-introduced variant of the verifiable information dispersal scheme from [11] to gurantee data availability. to At the base, the Saviadori layer, uses a newly-introduced variant of the verifiable information dispersal scheme from [11] to guarantee data availability.    

pag 7

from The dissemination of the full block to clients (e.g., the rollup provers) does not necessarily complete even if the block has already been finalized, and only a minimally necessary bandwidth is used to ensure data availability on the critical path to The dissemination of the full block to clients (e.g., the rollup provers) is not necessarily complete even if the block has already been finalized, and only a minimally necessary bandwidth is used to ensure data availability on the critical path  

pag 7

from A common approach to adapt a permissioned protocol to the proof-ofstake setting is to elect a small random committee that represents the entire set of stakers and run consensus among the committee members. to A common approach to adapt a permissioned protocol to the proof-of-stake setting is to elect a small random committee that represents the entire set of stakers and run consensus among the committee members.  

pag 22

from A centralized CDN might be an easy target for an attacker, or it could experience occassional downtime even in the absence of any malicious actor to A centralized CDN might be an easy target for an attacker, or it could experience occasional downtime even in the absence of any malicious actor  

pag 23

from There are three types of storage nodes: oridnary storage nodes (Savoiardi), the small DA committee nodes (Marscapone), and the content delivery network (CDN) node (Cocoa). to There are three types of storage nodes: ordinary storage nodes (Savoiardi), the small DA committee nodes (Marscapone), and the content delivery network (CDN) node (Cocoa). Block sender  

pag 24

from Respond to the block sender with a signed attestetion of C to Respond to the block sender with a signed attestation of C

elliedavidson commented 1 year ago

Thanks for submitting this! I've tagged to appropriate people to take a look.