Content
@
0 reply
0 recast
0 reaction
emo.eth
@emo.eth
password-protected mint (uses msg.sender and recent blockhash as public inputs and password as private input to a zk proof that’s verified onchain)
4 replies
8 recasts
31 reactions
emo.eth
@emo.eth
how do you invalidate proofs vs signatures? 🤔 for signatures, we invalidate the signed "digest" hash to avoid re-using malleable signatures i'm pretty sure STARKs are malleable as well (idk about SNARKs - anyone know?) - so maybe hash the public inputs and invalidate that but what if multiple proofs have the same inputs - could also use validity key as part of calculating the "digest", my understanding is that it's kind of a unique "circuit/program id" what are people doing now?
0 reply
0 recast
2 reactions