The paper uses polynomial amortization trick to maintain the communication cost of many nullity checks in a single nullity-check plus one additional $\mathbb Z_q$ element from $\mathcal{V}$ to $\mathcal{P}$ (the challenge $\rho$).
Since $\rho$ is generated after committing to secret $\mathbf x$, it should have been appended $[\mathbf x]$ to transcript (applied to FS transformation) before obtaining Pi_NULLITY_Proof. So much for adding P_secure (Essentially equals to P_vec) is enough to convert the code into Strong Fiat-Shamir Transformation.
I did some math and ensured that it may has no need to append $L_i$ form to transcript, for $\rho = \operatorname{HASH}([\mathbf x],\cdot)$ is suffice.
TODO: It would also affect zk_amortized_7, but due to lack of research about amortized version of the paper, the pull request related to this issues would only change zk_protocol_7.
The paper uses polynomial amortization trick to maintain the communication cost of many nullity checks in a single nullity-check plus one additional$\mathbb Z_q$ element from $\mathcal{V}$ to $\mathcal{P}$ (the challenge $\rho$ ).$\rho$ is generated after committing to secret $\mathbf x$ , it should have been appended $[\mathbf x]$ to $L_i$ form to $\rho = \operatorname{HASH}([\mathbf x],\cdot)$ is suffice.
Since
transcript(applied to FS transformation) before obtaining Pi_NULLITY_Proof. So much for addingP_secure(Essentially equals toP_vec) is enough to convert the code into Strong Fiat-Shamir Transformation.I did some math and ensured that it may has no need to append
transcript, forTODO: It would also affect zk_amortized_7, but due to lack of research about amortized version of the paper, the pull request related to this issues would only change zk_protocol_7.