The rationale for the NIZK proof could be made more clear. We should add this somewhere to the protocol overview, with details in the security considerations. We should also extract the "mapping" computation to a separate section so it can be reviewed independently of the rest of the protocol details.
The rationale for the NIZK proof could be made more clear. We should add this somewhere to the protocol overview, with details in the security considerations. We should also extract the "mapping" computation to a separate section so it can be reviewed independently of the rest of the protocol details.