You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to libsnark
Greetings:
We are generating the key pair based on our constraint system.
If we persist the keys, are they reusable with different inputs into creating the proof and verifying or do we need to generate a new key pair with every proof/verify invocation?
Thank you
Frank
Daira Hopwood
unread,
May 31, 2018, 7:56:04 AM5/31/18
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Frank Castellucci, libsnark
They are reusable, given that the constraint system implementation makes the needed
distinction between inputs and the system.