Resource logics: Connecting nullifiers and consumed resources

I think we should probably do this. I would consider the nullifier key a technical detail that must be dealt with properly for shielded resources, but that we should avoid relying on for any desired properties of applications (such as authorization), indexing, etc.

@xuyang @vveiln What role exactly do nullifier keys play in shielded proofs? Is it just randomness to ensure unlinkability, or is there some additional property being provided?

2 Likes