zk
zk copied to clipboard
Question in tranform
just had a small question:
How can we attack a system which follows fiat-schamir heuristic given that the hash computed in by the prover in the second step only includes the provers public key and not the random challenge in step 1 as in the general protocol.
Why do we hash the random challenge along with the public key. Public key should be enough for the verifier to prove non-repudiation?
Thanking you
Missing some context, which public key are you referring to?