Skip to content

Commit 383f5b8

Browse files
authored
Merge pull request #44 from AAU-Dat/capital
Capitalization of section titles
2 parents 603f0c1 + 1449c19 commit 383f5b8

File tree

6 files changed

+12
-12
lines changed

6 files changed

+12
-12
lines changed

report/src/sections/04-Approach.tex

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@ \subsection{Springproofs}\label{sec:approach-springproofs}
2929
$N\gets 2^{\lceil\log n\rceil-1}$
3030
$i_h \gets \lfloor (2N-n)/2\rfloor+1$
3131
$i_t=\lfloor n/2\rfloor$
32-
if $n\neq N$: #Not power of 2
32+
if $n\neq N$: #Not power of two
3333
$\mathbf{\mathcal{T}}\gets\{i_h:i_t\}\cup\{N+1:n\}$
34-
else if $n=N$: #Power of 2
34+
else if $n=N$: #Power of two
3535
$\mathbf{\mathcal{T}}\gets\{1:n\}$ #Meaning S is empty
3636
$\mathbf{\mathcal{S}}\gets\mathbf{n}-\mathbf{\mathcal{T}}$
3737
\end{lstlisting}
@@ -136,7 +136,7 @@ \subsubsection*{Prover computation}
136136

137137
At the end of the recursive round, on line 31,~$n$ is updated to the length of the concatenated vectors before starting a new round.
138138

139-
The result of this is a proof,~$\mathbf{\pi}$, constructed in $\lceil \log n \rceil$ rounds, but with the proof size being smaller than if the shuffle size was a power of 2.
139+
The result of this is a proof,~$\mathbf{\pi}$, constructed in $\lceil \log n \rceil$ rounds, but with the proof size being smaller than if the shuffle size was a power of two.
140140

141141
In step 3, lines 32--36, the folded vectors of size 1 are added to the proof as values as well as the commitments to the blinding values,~$B_C$ and~$B_D$.
142142
The proof, folded vectors, and updated commitment are saved for the verifier to use for verification.
@@ -223,7 +223,7 @@ \subsubsection*{Verifier computation}
223223
\end{theorem}
224224

225225

226-
\subsection{Shuffle security}\label{subsec:approach-shuffle-security}
226+
\subsection{Shuffle Security}\label{subsec:approach-shuffle-security}
227227
The shuffle method proposed by Larsen et al.~\cite{cryptoeprint:2022/560} that is used in Curdleproofs is based on the idea of shuffling a list of proposers over a set of slots.
228228
A formal definition of the shuffle is given in~\autoref{fig:shuffle}.
229229

@@ -397,7 +397,7 @@ \subsubsection{Shuffle Security}
397397

398398
By repeating this experiment for several runs, one can experimentally say when a shuffle with given parameters is secure.
399399

400-
\subsubsection{Size reduction}
400+
\subsubsection{Size Reduction}
401401
If we reduce the shuffle size used in Whisk and still prove it secure, then we expect to see a reduction in the size overhead on the blockchain.
402402

403403
We first set our focus on Curdleproofs, as this is the protocol we have modified directly.
@@ -413,7 +413,7 @@ \subsubsection{Size reduction}
413413

414414
The CAAUrdleproofs modification can still reduce the overall block size overhead.
415415
By using the overhead calculation described by Whisk on CAAUrdleproofs, it measures a block overhead of $16.656$ KB when the shuffle size is 128~\cite{Whisk2024}.
416-
Note that this is the same size as Curdleproofs, as the shuffle size is a power of 2.
416+
Note that this is the same size as Curdleproofs, as the shuffle size is a power of two.
417417
The provided calculation of the block overhead is provided as the following, where $\mathbb{G}=48$ bytes and $\mathbb{F}=32$ bytes\footnote{\text{As noted in the code on the Curdleproofs GitHub repository: }\\ \href{https://github.com/asn-d6/curdleproofs/blob/main/src/whisk.rs}{https://github.com/asn-d6/curdleproofs/blob/main/src/whisk.rs}. Accessed: 26/05/2025}:
418418
\begin{itemize}
419419
\item List of shuffled trackers ($\ell\cdot96\Rightarrow\text{eg. }124\cdot96=11,904$ bytes).

report/src/sections/05-experimental-protocol.tex

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ \section{Experimental Protocol}\label{sec:experimental-protocol}
1111
The virtual machine is running Ubuntu Server 24.
1212

1313

14-
\subsection{CAAUrdleproof}\label{sec:CAAUrdleproof-experiment}
14+
\subsection{CAAUrdleproofs}\label{sec:CAAUrdleproof-experiment}
1515
In this experiment, we measure the time to run the CAAUrdleproofs protocol.
1616
The results will be compared to those of Curdleproofs, which we re-run on our hardware.
1717
As Curdleproofs already has a Rust benchmark implemented, we will be using that same benchmark for both protocols.
@@ -24,7 +24,7 @@ \subsection{CAAUrdleproof}\label{sec:CAAUrdleproof-experiment}
2424

2525

2626

27-
\subsection{Shuffle security}\label{subsec:experimental-protocol-shuffle-security}
27+
\subsection{Shuffle Security}\label{subsec:experimental-protocol-shuffle-security}
2828
In this experiment, we run the shuffle protocol with varying shuffle sizes and varying numbers of adversarial tracked ciphertexts.
2929
The purpose of this experiment is to find the lowest possible shuffle size that is still secure against adversarial tracking.
3030
We, therefore, run the experiment with shuffle sizes,~$\ell$, between 32 and 512.

report/src/sections/06-results.tex

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ \subsection{Proving and Verifying Times}\label{subsec:results:provingverifying}
2929

3030

3131

32-
\subsection{Shuffle security}\label{subsec:Shuffle-security}
32+
\subsection{Shuffle Security}\label{subsec:Shuffle-security}
3333

3434
\begin{figure}[!htb]
3535
\centering

report/src/sections/07-discussion.tex

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ \section{Discussion}\label{sec:discussion}
55
We will also discuss some of the limitations of the CAAUrdleproofs protocol and how it compares to Curdleproofs.
66

77

8-
\subsection{CAAUrdleproofs in comparison to Curdleproofs}\label{subsec:CAAUrdleproofs-vs-Curdleproofs}
8+
\subsection{CAAUrdleproofs in Comparison to Curdleproofs}\label{subsec:CAAUrdleproofs-vs-Curdleproofs}
99
As mentioned in~\autoref{subsec:results:provingverifying}, the proving and verifying times between the two protocols are close to identical when $\ell$ is a power of two.
1010
This is because the added computation is negligible compared to the other computations present in the original Curdleproofs protocol.
1111

report/src/sections/09-future-works.tex

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
\section{Future work}\label{sec:future-works}
1+
\section{Future Work}\label{sec:future-works}
22
In this section, we will focus on areas where the Whisk protocol still has room for improvement.
33

44
The main modification from Curdleproofs to CAAUrdleproofs is the added flexibility in choosing the shuffle size for Whisk.

report/src/sections/appendix/04-shuffling-times.tex

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
\clearpage
2-
\section{Shuffling results}\label{sec:shuffling-results}
2+
\section{Shuffling Results}\label{sec:shuffling-results}
33
Here, we present the results of the shuffling times given different shuffling size values.
44
The results can be seen in~\autoref{fig:shufflespeed}.
55
\begin{figure}[!htb]

0 commit comments

Comments
 (0)