Skip to content

Commit 64e06e5

Browse files
authored
Merge pull request 0xPolygon#613 from 0x3lden/main
Fixes typos and reformulates unclear sentences
2 parents f2f370e + 37cf8ea commit 64e06e5

File tree

7 files changed

+8
-10
lines changed

7 files changed

+8
-10
lines changed

docs/zkEVM/architecture/proving-system/execution-trace-design.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ The intention is to ensure that each row of an execution trace contains all data
44

55
**Notation**
66

7-
Since execution traces are created in the context of state machines, columns of a execution trace are also referred to as _registries_.
7+
Since execution traces are created in the context of state machines, columns of an execution trace are also referred to as _registries_.
88

99
A registry $\texttt{A}$ is denoted by $\texttt{A} = ( a_0, a_1, ... , a_{2^{k}-1})$, where each $a_{i+1}$ is the value in $\texttt{A}$ subsequent to $a_i$. Denote this next value in $\texttt{A}$ by $a'$. That is, $a' = a_{i+1}$.
1010

@@ -123,7 +123,7 @@ $$
123123
\texttt{OP2}:\ c' = a + b + c + a' + b'
124124
$$
125125

126-
The computation's final outcome is in this case placed in column $\texttt{C}$, as shown inthe table below.
126+
The computation's final outcome is in this case placed in column $\texttt{C}$, as shown in the table below.
127127

128128
![Figure: ](../../../img/zkEVM/prover-operands-alternative.png)
129129

docs/zkEVM/architecture/proving-system/json-rpc-to-proof.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ The `validateTx()` function performs the following preliminary checks:
178178

179179
1. The transaction IP address has a valid format.
180180

181-
2. The transaction fields are properly signed (in both current and pre-EIP-155). EIP- 155 states that we must include the `chainID` in the hash of the data to be signed (which is an anti-replay attack protection).
181+
2. The transaction fields are properly signed (in both current and pre-EIP-155). EIP-155 states that we must include the `chainID` in the hash of the data to be signed (which is an anti-replay attack protection).
182182

183183
3. The transaction’s `chainID` is the same as the pool’s `chainID` (which is the `chainID` of the L2 Network) whenever `chainID` is not zero.
184184

docs/zkEVM/architecture/proving-system/polynom-identity-lang.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -132,9 +132,7 @@ Publicly known values, or _publics_, are not only important in the proving phase
132132

133133
As seen in the previous figure above, _publics_ form part of the verfier's inputs. And, similar to the above pasword protocol, these _publics_ are uniquely related to the executor's input program.
134134

135-
Note that all values in PIL are, by default, considered private.
136-
137-
By default, all values in PIL are considered private. However, any specific can be made public by using the keyword _public_.
135+
By default, all values in PIL are considered private. However, any specific value can be made public by using the keyword _public_.
138136

139137
![Figure: ](../../../img/zkEVM/prover-exec-trace-hash-and-verifier.png)
140138

docs/zkEVM/architecture/zkprover/hashing-state-machines/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ operating on a fixed number $b$ of bits.
1818

1919
The array of $b$ bits that $f$ keeps transforming is called the _state_, and $b$ is called the _width_ of the state.
2020

21-
The state array is split into two chunks, one with $r$ bits and the other with $c$ bits. The width $b = r + c$,_ where_ $r$ is called the _bitrate_ (or simply _rate_) and $c$ is called the _capacity_.
21+
The state array is split into two chunks, one with $r$ bits and the other with $c$ bits. The width $b = r + c$, where $r$ is called the _bitrate_ (or simply _rate_) and $c$ is called the _capacity_.
2222

2323
## Sponge construction phases
2424

docs/zkEVM/architecture/zkprover/hashing-state-machines/keccak-framework.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
The zkEVM, as an L2 zk-Rollup for Ethereum, employs the Keccak hash function to achieve seamless compatibility with the Ethereum blockchain at Layer 1. However, rathe four state machines relate implementing the Keccak-256 hash function as a single state machine, the zkEVM does so in a framework of four state machines. The four state machines relate as follows:
1+
The zkEVM, as an L2 zk-Rollup for Ethereum, employs the Keccak hash function to achieve seamless compatibility with the Ethereum blockchain at Layer 1. However, rather than implementing a single state machine that performs four different tasks, the zkEVM does so in a framework of four state machines:
22

33
1. The Padding-KK SM is used for padding purposes, as well as validation of hash-related computations pertaining to the Main SM's queries. As depicted in the figure below, the Padding-KK SM is the Main SM's gateway to the Keccak hashing framework.
44

docs/zkEVM/architecture/zkprover/hashing-state-machines/paddingkk-sm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
All Keccak-related state machines are accessed through the Padding-KK state machine. It is therefore responsible for handling queries from the Main state machine. Common queries are requests for digests of messages, together with validation of these digests.
22

3-
In this document, the internal mechanism of the Padding-KK SM is described. How it validates the validity of hash values, input string lengths, and input string readings to ensure that padding requirements are followed.
3+
This document describes the internal mechanism of the Padding-KK SM. It explains how the state machine validates hash values, input string lengths, and input string readings to ensure that padding requirements are followed.
44

55
First, keep in mind that the Padding-KK SM's operations are byte-based, whereas the Keccak-F SM's actions are bit-based. This discrepancy in string formats is handled by the Padding-KK-Bit SM.
66

docs/zkEVM/spec/pil/simple-example.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ In the zkEVM context, these polynomials would be committed by the Main state mac
7979

8080
The above design of the _Multiplier_ program, as represented by its execution trace, does not scale easily to more complex operations. The number of polynomials (or number of columns) grows linearly with the number of operations that needs to be performed.
8181

82-
For example, if we were design a Multiplier program that computes $2^{10}$ operation, the above design would require $2^{10}$ committed polynomials, which is far from being practical.
82+
For example, if we were to design a Multiplier program that computes $2^{10}$ operation, the above design would require $2^{10}$ committed polynomials, which is far from being practical.
8383

8484
Here's a more practical design, which reduces the $2^{10}$ committed polynomials to only 3 polynomials;
8585

0 commit comments

Comments
 (0)