Skip to content

Commit 300b1d5

Browse files
[docs] Center Align (#3830)
1 parent 0b6b396 commit 300b1d5

3 files changed

Lines changed: 32 additions & 6 deletions

File tree

docs/blogs/phone-a-friend.html

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -284,10 +284,10 @@ <h3 id="a-first-attempt">A First Attempt</h3>
284284
pairings.</p>
285285
<h2 id="our-approach">Our Approach</h2>
286286
<p>We start from a simple observation:</p>
287-
<blockquote>
287+
<div data-align="center">
288288
<p><em>A perfectly correct encryption scheme is also a perfectly
289289
binding commitment scheme</em></p>
290-
</blockquote>
290+
</div>
291291
<p>If a helper provides us the message <em>and</em> randomness
292292
used to create the ciphertext, we can avoid the decryption
293293
equation check entirely. Instead, we can check that the
@@ -532,13 +532,13 @@ <h3 id="simple-bte-as-a-witness-encryption-scheme">Simple BTE as
532532
[k_1\tau^{B+1}]_T+m_1,\ldots,[k_B\tau^{B+1}]_T+m_B
533533
\right).
534534
\]</span></p>
535-
<blockquote>
535+
<div data-align="center">
536536
<p>This is precisely the batch of ciphertexts together with the
537537
partial decryption in the simple-BTE scheme! Thus the users and
538538
the committee produce the ciphertext <span
539539
class="math inline">\(\mathsf{ct}\)</span> in a
540540
<em>distributed</em> manner.</p>
541-
</blockquote>
541+
</div>
542542
<p><strong>Decrypt:</strong> To decrypt the <span
543543
class="math inline">\(i\)</span>-th ciphertext, we use <span
544544
class="math inline">\(\{h_{\ell+B+1-i}\}_{\ell\in[0,B]\setminus\{i\}}\)</span>

docs/blogs/phone-a-friend.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,11 @@ So if all ciphertexts use the same witness, the verifier can fold pairings acros
103103

104104
We start from a simple observation:
105105

106-
> *A perfectly correct encryption scheme is also a perfectly binding commitment scheme*
106+
<div align="center">
107+
108+
*A perfectly correct encryption scheme is also a perfectly binding commitment scheme*
109+
110+
</div>
107111

108112
If a helper provides us the message *and* randomness used to create the ciphertext, we can avoid the decryption equation check entirely. Instead, we can check that the ciphertext is a valid encryption of the claimed message under the claimed randomness. In the linear WE notation above, this means checking:
109113

@@ -286,7 +290,11 @@ $$
286290
\right).
287291
$$
288292

289-
> This is precisely the batch of ciphertexts together with the partial decryption in the simple-BTE scheme! Thus the users and the committee produce the ciphertext $\mathsf{ct}$ in a *distributed* manner.
293+
<div align="center">
294+
295+
This is precisely the batch of ciphertexts together with the partial decryption in the simple-BTE scheme! Thus the users and the committee produce the ciphertext $\mathsf{ct}$ in a *distributed* manner.
296+
297+
</div>
290298

291299
**Decrypt:** To decrypt the $i$-th ciphertext, we use $\{h_{\ell+B+1-i}\}_{\ell\in[0,B]\setminus\{i\}}$ as the witness which is readily available in the public parameters.
292300
$$

docs/style.css

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,10 @@ p {
8282
margin-bottom: 5px;
8383
}
8484

85+
div[data-align="center"] {
86+
text-align: center;
87+
}
88+
8589
button {
8690
padding: 5px;
8791
margin-bottom: 5px;
@@ -383,6 +387,20 @@ details.podcast-episode summary.podcast-title {
383387
padding-bottom: 0.25rem;
384388
}
385389

390+
/* Avoid subpixel seams between KaTeX's stitched stretchy brace pieces. */
391+
.katex .brace-left {
392+
width: 25.4%;
393+
}
394+
395+
.katex .brace-center {
396+
left: 24.8%;
397+
width: 50.4%;
398+
}
399+
400+
.katex .brace-right {
401+
width: 25.4%;
402+
}
403+
386404
/* MCP page styles */
387405
#tool-selector {
388406
margin: 20px 0;

0 commit comments

Comments
 (0)