Ozgun: I would like you to review the following background materials and try to arrive at a solid theoretical and mathematical understanding of the ability to use certain algebraic hash functions to provide fingerprints for polynomials. I have some intuition that we can leverage this ability within our new PoAS protocol, in conjunction with the KZG schemes we are already using. For example, we might be able to commit to some data using an algebraic hash function instead of a normal hash function, and then commit to those hashes using KZG. I don’t have a clear understanding of the math and how existing constructions work to be able to think about this properly yet — that’s where I need your help.
Please read the following three papers, including any other relevant background materials or secondary sources you deem usefully. I would like you to document your findings and try to unpack the theory and math behind how they work, similar to what you did for Dankrad’s article on KZG. My intuition is that these are all variations on a common theme. Ideally we would be able to publish this as a blog post again, but don’t focus on making it high-quality just yet. I would like you time box this to what you can accomplish within one week.
I believe both all of these schemes are related to the simple commitment scheme presented in the introduction of the KZG paper.
<aside> <img src="/icons/mathematics_purple.svg" alt="/icons/mathematics_purple.svg" width="40px" /> Let $g$ and $h$ be two random generators of a group ${\mathbb G}$ of prime order $p$. The committer can commit to a random message $m\in \Z_p$ simply as $C_{\langle g \rangle}(m) = g^m$.
</aside>