14:42:08 suraeNoether: let me know when you're available to briefly chat about multisig security for the newer sublinear transaction protocols 14:42:24 I want to confirm a few things about honest-but-curious MPC 19:56:15 Here is an informal description of how Triptych multisig could work: https://github.com/SarangNoether/skunkworks/blob/inverse-mpc/triptych-mpc.md 19:57:10 that was quick! 20:00:03 They grind quickly *and* fine. 20:04:58 real_or_random: I haven't formally analyzed it yet, FWIW 20:05:08 It _appears_ fine assuming honest-but-curious players 20:05:18 :D 20:05:44 A similar technique should work (or not work...) for RCT3 too 20:06:43 I'll write that up shortly 20:07:24 this reminds me that I wanted to work on making the bulletproof MPC secure against fully malicious co-provers 20:07:34 Ah, nice! 20:07:36 without doubling the number of rounds 20:07:47 That would be even nicer! 20:08:15 You could perhaps argue that for some multisig situations, honest-but-curious is an acceptable risk 20:08:52 (not saying I have a solution but some vague ideas. I think the underlying problem is very similar to the problems in MuSig, and why you need the commitment round there) 20:09:15 I'll be very interested to hear any ideas that you have on that 20:11:57 Not sure whethere it's relevant to "honest-but-curious is an acceptable risk", but multisig is often used with people who'd steal from each other: a trade between randoms with an arbitrator in a 2/3 multisig. They wouldn't need the arbitrator if they were not gonna steal. 20:13:43 sarang: yep, I should think about this. let's discuss this at some point :) 20:13:50 For sure! 20:14:09 I'm adding this to my official list of stalled research projects lol 20:14:39 ah it's already on the list :D at least 20:15:42 Yeah moneromooo what remains is to determine what risks arise (or don't) from the assumption of malicious players 20:16:02 Adding precommitments provides stronger guarantees at the cost of communication complexity 20:16:35 as well as avoiding the one-to-many nature of the dealer-player relationship for the proof, in favor of having all players confirm proof elements at each phase 20:16:41 but again, adds communication complexity 20:21:07 This is just a starting point to show that the different linking tag format isn't necessarily a showstopper for MPC 20:22:55 FWIW I think honest-but-curious is mostly useless in practice 20:23:24 why should you be malicious only later? there are a few scenarios but they're a stretch 20:24:20 I think hbc is mostly useful as a lower goal and a first step when constructing protocols, but not when you deploy then 20:27:07 I was also thinking of cases like multifactor, or having the peer-to-peer data obtained 20:30:02 The inversion MPC does include extra proofs (a range proof, for one, due to the Paillier encryption) for this reason, which I didn't include in the initial writeup or example code