Previously, validators were not Clone. This made it safer and easier to keep track of when and where the validator was outstanding. For malicious security protocols with batched verification (rather than verifying once at the conclusion of the entire protocol), we have relaxed this, but we should try to improve it, which will probably involve something like moving the validate_record method from the validator to the context, and various changes to how/where malicious protocol state is accessed and used to support that.
Previously, validators were not
Clone
. This made it safer and easier to keep track of when and where the validator was outstanding. For malicious security protocols with batched verification (rather than verifying once at the conclusion of the entire protocol), we have relaxed this, but we should try to improve it, which will probably involve something like moving thevalidate_record
method from the validator to the context, and various changes to how/where malicious protocol state is accessed and used to support that.