Suyash Bagad
Suyash Bagad
Is the above strategy for non-power of two secret vectors implemented anywhere? I am working on a bulletproofs-like protocol for a different problem. Seems like it is unavoidable to use...
Yes. Although this could be very useful, but adding such a flag can be very error-prone, especially at this stage. Hence, closing.
Discussed this with @Rumata888. TLDR: We think its best to keep the current code as it is. So to assert a bigfield element $a$ is equal to bigfield element $b$,...