From bf6d48f754200a75bd60449bb9b5e35ec4eb94c7 Mon Sep 17 00:00:00 2001 From: Satyam Bansal Date: Thu, 24 Aug 2023 09:45:46 +0530 Subject: [PATCH] :memo: Edit chapter 1 and chapter 6 (#182) * Fix Invoke function description on chapter 1 * Fix chapter 6 formatting --- chapters/book/modules/chapter_1/pages/first_contract.adoc | 2 +- chapters/book/modules/chapter_6/pages/trust_verification.adoc | 3 +-- 2 files changed, 2 insertions(+), 3 deletions(-) diff --git a/chapters/book/modules/chapter_1/pages/first_contract.adoc b/chapters/book/modules/chapter_1/pages/first_contract.adoc index 1f1a0ca25..76ffaa7db 100644 --- a/chapters/book/modules/chapter_1/pages/first_contract.adoc +++ b/chapters/book/modules/chapter_1/pages/first_contract.adoc @@ -254,7 +254,7 @@ As expected, it returns the address that we passed to the constructor during dep === Invoking a Function -To modify the state of the smart contract, we use the invoke command. Unlike the call command, invoke requires additional flags because we need to pay gas fees to execute the transaction: +To modify the state of the smart contract, we use the invoke command. In this example, we'll invoke the transfer_ownership function to transfer the ownership from our deployer address to a different smart wallet address: diff --git a/chapters/book/modules/chapter_6/pages/trust_verification.adoc b/chapters/book/modules/chapter_6/pages/trust_verification.adoc index 39331bbc2..8557cd508 100644 --- a/chapters/book/modules/chapter_6/pages/trust_verification.adoc +++ b/chapters/book/modules/chapter_6/pages/trust_verification.adoc @@ -35,8 +35,7 @@ A good analogy is the examination process practiced in a court of law when one p We say that a proof system _solves_ CI if when updating the system from state A to state B, the following properties hold: * *Completeness*: If the prover indeed knows how to change the state from A to B in a valid way then the prover will manage to convince the verifier to accept the change. -* {blank} - ** *Soundness*: If the prover doesn't know how to change the state from A to B, then the verifier will notice an inconsistency in the interaction and reject the suggested state transition. There remains a tiny false-positive probability, i.e., a probability of the verifier accepting an invalid proof. This probability is a system security parameter which can be set to an acceptable level like 1/(2¹²⁸), similar odds to winning the powerball five times in a row. +* *Soundness*: If the prover doesn't know how to change the state from A to B, then the verifier will notice an inconsistency in the interaction and reject the suggested state transition. There remains a tiny false-positive probability, i.e., a probability of the verifier accepting an invalid proof. This probability is a system security parameter which can be set to an acceptable level like 1/(2¹²⁸), similar odds to winning the powerball five times in a row. This pair of properties has a crucial implication to the principle of Inclusive Accountability discussed earlier. The verifier can accept the state transition suggested by the prover without making any assumptions about the integrity of the prover. In fact, the prover can run on faulty hardware, it can be closed source and it can be executed on a computer controlled by a malicious entity. The only thing that matters¹ is that the messages sent by the prover lead the verifier to accept the statement. If that is the case, we know that computational integrity holds.