diff --git a/cryptography/kzg_multi_open/src/fk20/verifier.rs b/cryptography/kzg_multi_open/src/fk20/verifier.rs index 18575165..13e83a3e 100644 --- a/cryptography/kzg_multi_open/src/fk20/verifier.rs +++ b/cryptography/kzg_multi_open/src/fk20/verifier.rs @@ -298,8 +298,7 @@ fn compute_fiat_shamir_challenge( // This is noted because when we convert a 256 bit hash to a scalar, a bias will be introduced. // This however does not affect our security guarantees because the bias is negligible given we // want a uniformly random 128 bit integer. - - // TODO: computing powers will remove the 128 bit structure, consider generating `n` 128 bit scalars + // // Also there is a negligible probably that the scalar is zero, so we do not handle this case here. reduce_bytes_to_scalar_bias(result) }