Skip to content

Commit e862f7e

Browse files
authored
update (#633)
1 parent fe5d5be commit e862f7e

File tree

3 files changed

+6
-0
lines changed

3 files changed

+6
-0
lines changed

images/entropy-1.png

210 KB
Loading

images/entropy-2.png

269 KB
Loading

pages/entropy/protocol-design.mdx

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,9 @@ This protocol has the property that the result is random as long as either A or
1313
Thus, neither party needs to trust the other -- as long as they are themselves honest, they can
1414
ensure that the result $r$ is random.
1515

16+
The diagram below shows the protocol flow:
17+
![Entropy Protocol Flow](images/entropy-1.png)
18+
1619
Entropy implements a version of this protocol that is optimized for on-chain usage. The
1720
key difference is that one of the participants (the provider) commits to a sequence of random numbers
1821
up-front using a hash chain. Users of the protocol then simply grab the next random number in the sequence.
@@ -44,6 +47,9 @@ Of course, both of these behaviors are detectable and protocols can blacklist pr
4447
This protocol has the same security properties as the 2-party randomness protocol above: as long as either
4548
the provider or user is honest, the number $r$ is random.
4649

50+
The diagram below shows the user's interaction with the entropy contract to generate a random number:
51+
![Entropy Contract Flow](images/entropy-2.png)
52+
4753
Note that providers need to be careful to ensure their off-chain service isn't compromised to reveal the random numbers -- if this occurs, then users will be able to influence the random number $r$.
4854

4955
The code of default deployed provider can be found [here](https://github.com/pyth-network/pyth-crosschain/tree/7bccde484f01c19844b7105d63df207a24018957/apps/fortuna).

0 commit comments

Comments
 (0)