aszepieniec 2024-12-16 ๐ ๐
In this context, we are proving knowledge of the preimage of a hash digest. The input cannot be constrained because the verifier is supposed to be ignorant of this value. Phrased differently, if the input were constrained, then the verifer would be able to extract the secret input, defeating the security of the entire construction.