Skip to content

Commit 845b3ed

Browse files
committed
docs(common): updates
1 parent 5ad487f commit 845b3ed

File tree

4 files changed

+5
-4
lines changed

4 files changed

+5
-4
lines changed

docs/solidity-guides/SUMMARY.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
## Get Started
22

3-
- [Overview](overview.md)
3+
- [Overview](solidity-overview.md)
4+
- [Quick Start guide](overview.md)
45
- [Quick Start - Hardhat](hardhat/README.md)
56
- [Prerequisites](hardhat/prerequisites.md)
67
- [1. Setting up Hardhat](hardhat/1.-setting-up-hardhat.md)

docs/solidity-guides/configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ import { SepoliaConfig } from "@fhevm/solidity/config/ZamaConfig.sol";
5959
**Purpose**
6060

6161
- Configures the relayer for secure cryptographic operations.
62-
- Facilitates reencryption and decryption requests.
62+
- Facilitates public and user decryption requests.
6363

6464
**Example: Configuring the relayer with Sepolia settings**
6565

docs/solidity-guides/functions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -311,7 +311,7 @@ function allowTransient(T value, address account) internal
311311

312312
#### Access control list (ACL) overview
313313

314-
The `allow` and `allowTransient` functions enable fine-grained control over who can access, decrypt, and reencrypt encrypted values. Temporary permissions (`allowTransient`) are ideal for minimizing gas usage in scenarios where access is needed only within a single transaction.
314+
The `allow` and `allowTransient` functions enable fine-grained control over who can access and decrypt encrypted values. Temporary permissions (`allowTransient`) are ideal for minimizing gas usage in scenarios where access is needed only within a single transaction.
315315

316316
**Example: granting access**
317317

docs/solidity-guides/inputs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
This document introduces the concept of encrypted inputs in the fhevm, explaining their role, structure, validation process, and how developers can integrate them into smart contracts and applications.
44

55
{% hint style="info" %}
6-
Understanding how encryption, decryption and reencryption works is a prerequisite before implementation, see [Encryption, Decryption, and Computation](../introductions/d_re_ecrypt_compute.md)
6+
Understanding how encryption, public, and user decryption works is a prerequisite before implementation, see [Encryption, Decryption, and Computation](../introductions/d_re_ecrypt_compute.md)
77
{% endhint %}
88

99
Encrypted inputs are a core feature of fhevm, enabling users to push encrypted data onto the blockchain while ensuring data confidentiality and integrity.

0 commit comments

Comments
 (0)