- 
sarang Hello all 
- 
koe morning 
- 
gingeropolous 'ello 
- 
midipoet halo 
- 
sarang 
- 
sarang Please read and comment 
- 
moneromooo "whatever more complex mathematics is used for balance assertion is unlikely in practice" I think the word unlikely means something else for the casual reader than for a cryptographer. 
- 
koe amounts are hidden using cryptographic structures called Pedersen commitments Xthat hide amountsX. 
- 
koe The benefit is to help with -> This helps with 
- 
moneromooo "It is not possible to _prove_ that these problems are hard" Is that really right ? I thought it was possible to prove. 
- 
sgp_ koe: added the small wording change 
- 
moneromooo Or at least not known to be impossible. But hey, I'm in the peanut galleery. 
- 
sgp_ I'll defer to sarang for the others 
- 
sarang Hardness assumptions are just that: assumptions 
- 
moneromooo But AFAIK assumption as in we did not prove it was, nor that it wasn't. Not as in we proved it's not possible to prove even if it's true. Though I'm not sure how you'd prove it's not possible to prove something which is true but it doens't sound impossible offhand. 
- 
moneromooo (say so if I'm plain wrong, I might well be) 
- 
sarang Oof, good catch koe 
- 
sarang 
- 
sarang ! 
- 
moneromooo OK. I was wrong then. Thanks. 
- 
sarang Oh no, I don't mean to say that any particular hardness assumptions fall into that 
- 
sarang The wording I used could be changed 
- 
sarang to something like "these hardness assumptions are not proven" 
- 
moneromooo Ah. Back in the race :D 
- 
sgp_ ping me when you two sort it out :p 
- 
sarang "It is not possible to _prove_ that these problems are hard, but decades of research and use implies this." <-- "The computational hardness of such assumptions is not proven, but decades of research and use imply this." 
- 
sarang Something like that, perhaps? 
- 
midipoet well, sarang just referenced Gödel, so we could be here a while. 
- 
sarang -____- 
- 
koe I like that better 
- 
sarang suraeNoether: any thoughts on the post? 
- 
endogenic sarang hrm i get the concepts but (a) it sounds like the blog ends on the note that further research on soundness isnt considered theoretically to be likely fruitful .. and separately (b) the diagram kinda makes it sound like soundness of the supply is not tied to implementation risks ... are you saying 'theoretical soundness' in that diagram? 
- 
endogenic (diagram with the circles) 
- 
koe the diagram confused me as well 
- 
sarang That was sgp_'s work 
- 
sgp_ o no what am I liable for now 
- 
sgp_ point was to try and visualize relative risks 
- 
endogenic LOL sarang instantly blame sgp 
- 
sarang Not my intent! 
- 
endogenic just teasing 
- 
sgp_ I can replace the image with something else that helps show relative risk 
- 
endogenic easy could be replacing  'soundness' with 'theory' (i.e. the theory/math) - and i'd make it the same color as the other dots since they're supposed to sorta be in the same category of objects 
- 
endogenic maybe put 'em all side by side, labels under 
- 
endogenic oops edit fail 
- 
endogenic s/the theory/the model/ 
- 
sarang I think it could be fine without the image 
- 
sgp_ sarang: I think so too, but I want some visual if possible 
- 
sgp_ endogenic koe sarang is this better? what can I replace the '...' with? I'm thinking something funny. 'fluffypocalypse'?  usercontent.irccloud-cdn.com/file/QY45aCfL/relative_risks
- 
sarang I'm not a fan of assigning relative risk sizes like this... someone will rightly complain 
- 
sgp_ how else can I help show users it's a relative balance of risks? in a large sense that's a main point of the post 
- 
sgp_ let me try a graph 
- 
sgp_ I already don't like the graph idea 
- 
sgp_ 
- 
rottensox great post sgp_, sarang. enjoyed it. 
- 
sgp_ do you at least get the goal of what I'm trying to convey? 
- 
sarang Maybe compare to likely vs. unlikely events? 
- 
sarang Getting a speeding ticket vs. getting struck by lightning 
- 
sarang You don't want either, but one of them is much less likely 
- 
xmrmatterbridge <atoc> yep speeding ticket is less likely 
- 
koe hi math nerds, Im wondering if the MLSAG decoy responses can be theoretically compressed if we change the randomness into hash outputs of the signed message (e.g. h1 = H(m,1), h2 = H(m,2); something like that) 
- 
koe I dont know how to compress while hiding the real one, but is it logically possible? 
- 
koe by compress Im considering the sum of field elements, e.g. q = a + b 
- 
koe or q = a*b 
- 
koe and the hiding effect from a truly random number, so generate a random number, compute the hashes, compute the decoy responses from true random and hashes, perform the signature and get the real response, compress the responses, then return one or two scalars which can be used in combination with the known hashes to generate the list of responses 
- 
koe and the real response is at an unknown index in that list 
- 
endogenic definite progress visually sgp 
- 
endogenic solved that problem 
- 
sgp_ can you elaborate endogenic? 
- 
endogenic uh nevermind i thought you renamed it for some reason. this is what i get for doing 4 things at once 
- 
sarang koe: I don't see how you could do that while still hiding the signing index 
- 
koe would it be reasonable to outsource the problem to other math nerds? here is my outline  justpaste.it/5zdsd
- 
koe would it be worthwhile to offer a bounty (e.g. let you guys focus on your current projects)? if so, would someone mind helping me formalize this? draft 2  justpaste.it/2ounn
- 
koe moreover, where would you even go to propose such a challenge? 
- 
sarang I think you can do this by seeding a hash-based chain and including an offset 
- 
Isthmus @sgp maybe something like a bee sting, a car accident, a tornado, and a tornado 
- 
sarang (if I'm understanding the problem correctly koe) 
- 
sarang koe: are you saying you want to be able to generate a sequence `S` such that for a secret index `l` we have `S[l] == v` for some secret value `v`? 
- 
sarang and the sequence `S` is uniformly distributed field elements? 
- 
sarang Because that is possible 
- 
koe where v is the product of a one way function of the other members of s 
- 
koe or in other words v can only be determined after all other members of s are known, and v is random 
- 
sarang 
- 
sarang You can select `v` at random after building the hash sequence `S`, and choose the offset `x` accordingly 
- 
sgp_ Isthmus: hmm, I'll try a few options 
- 
sarang In that example, `v` is whatever you want it to be 
- 
sarang You could have a set value, or choose it after building the sequence 
- 
koe ok lemme see 
- 
sarang Maybe this isn't what you're asking 
- 
sarang 
- 
koe well we have MLSAG scalars, and most of them are completely random, so why not offload most of that randomness to a hash function that verifiers can compute as well? then the prover just has two pieces of important info: the real response scalar, and the randomness used to obfuscate which index is the real scalar 
- 
koe kind of like how the commitment mask was changed, it's now created out of the transaction public key's randomness 
- 
koe not sure that code works, since x is a function of v, so after S += x, ALL the scalars will be functions of v 
- 
sarang Yeah, this wouldn't work for MLSAG/CLSAG 
- 
sarang Since you need `v` to construct `x` and offset the whole sequence 
- 
sarang Unless you operate on each sequence element, the verifier would gain information 
- 
koe Im trying to think of a way where, you do an operation on each element, and most of the time information related to v gets canceled out EXCEPT for the element v itself