|
|
@ -994,7 +994,7 @@ $1802 \times \nJoinSplit$ & $\vJoinSplit$ & |
|
|
|
\type{JoinSplitDescription} \type{[$\nJoinSplit$]} & |
|
|
|
The \sequenceOfJoinSplitDescriptions in this \transaction. \\ \hline |
|
|
|
|
|
|
|
33 $\dagger$ & $\joinSplitPubKey$ & \type{char[32]} & An encoding of an $\JoinSplitSigAlg$ |
|
|
|
32 $\dagger$ & $\joinSplitPubKey$ & \type{char[32]} & An encoding of an $\JoinSplitSigAlg$ |
|
|
|
public verification key \\ \hline |
|
|
|
|
|
|
|
64 $\dagger$ & $\joinSplitSig$ & \type{char[64]} & A signature on a prefix of the \transaction encoding, |
|
|
@ -2651,7 +2651,8 @@ Virza. |
|
|
|
The authors would like to thank everyone with whom they have discussed |
|
|
|
the \Zerocash protocol design; in addition to the inventors, this includes |
|
|
|
Mike Perry, Isis Lovecruft, Leif Ryge, Andrew Miller, Zooko Wilcox, |
|
|
|
Samantha Hulsey, Jack Grigg, Simon Liu, jl777, and no doubt others. |
|
|
|
Samantha Hulsey, Jack Grigg, Simon Liu, Ariel Gabizon, jl777, Ben Blaxill, |
|
|
|
and no doubt others. |
|
|
|
|
|
|
|
The Faerie Gold attack was found by Zooko Wilcox. |
|
|
|
The internal hash collision attack was found by Taylor Hornby. |
|
|
|