-
sarang
Hello all
-
koe
morning
-
gingeropolous
'ello
-
midipoet
halo
-
sarang
-
sarang
Please read and comment
-
moneromooo
"whatever more complex mathematics is used for balance assertion is unlikely in practice" I think the word unlikely means something else for the casual reader than for a cryptographer.
-
koe
amounts are hidden using cryptographic structures called Pedersen commitments Xthat hide amountsX.
-
koe
The benefit is to help with -> This helps with
-
moneromooo
"It is not possible to _prove_ that these problems are hard" Is that really right ? I thought it was possible to prove.
-
sgp_
koe: added the small wording change
-
moneromooo
Or at least not known to be impossible. But hey, I'm in the peanut galleery.
-
sgp_
I'll defer to sarang for the others
-
sarang
Hardness assumptions are just that: assumptions
-
moneromooo
But AFAIK assumption as in we did not prove it was, nor that it wasn't. Not as in we proved it's not possible to prove even if it's true. Though I'm not sure how you'd prove it's not possible to prove something which is true but it doens't sound impossible offhand.
-
moneromooo
(say so if I'm plain wrong, I might well be)
-
sarang
Oof, good catch koe
-
sarang
-
sarang
!
-
moneromooo
OK. I was wrong then. Thanks.
-
sarang
Oh no, I don't mean to say that any particular hardness assumptions fall into that
-
sarang
The wording I used could be changed
-
sarang
to something like "these hardness assumptions are not proven"
-
moneromooo
Ah. Back in the race :D
-
sgp_
ping me when you two sort it out :p
-
sarang
"It is not possible to _prove_ that these problems are hard, but decades of research and use implies this." <-- "The computational hardness of such assumptions is not proven, but decades of research and use imply this."
-
sarang
Something like that, perhaps?
-
midipoet
well, sarang just referenced Gödel, so we could be here a while.
-
sarang
-____-
-
koe
I like that better
-
sarang
suraeNoether: any thoughts on the post?
-
endogenic
sarang hrm i get the concepts but (a) it sounds like the blog ends on the note that further research on soundness isnt considered theoretically to be likely fruitful .. and separately (b) the diagram kinda makes it sound like soundness of the supply is not tied to implementation risks ... are you saying 'theoretical soundness' in that diagram?
-
endogenic
(diagram with the circles)
-
koe
the diagram confused me as well
-
sarang
That was sgp_'s work
-
sgp_
o no what am I liable for now
-
sgp_
point was to try and visualize relative risks
-
endogenic
LOL sarang instantly blame sgp
-
sarang
Not my intent!
-
endogenic
just teasing
-
sgp_
I can replace the image with something else that helps show relative risk
-
endogenic
easy could be replacing 'soundness' with 'theory' (i.e. the theory/math) - and i'd make it the same color as the other dots since they're supposed to sorta be in the same category of objects
-
endogenic
maybe put 'em all side by side, labels under
-
endogenic
oops edit fail
-
endogenic
s/the theory/the model/
-
sarang
I think it could be fine without the image
-
sgp_
sarang: I think so too, but I want some visual if possible
-
sgp_
endogenic koe sarang is this better? what can I replace the '...' with? I'm thinking something funny. 'fluffypocalypse'?
usercontent.irccloud-cdn.com/file/QY45aCfL/relative_risks
-
sarang
I'm not a fan of assigning relative risk sizes like this... someone will rightly complain
-
sgp_
how else can I help show users it's a relative balance of risks? in a large sense that's a main point of the post
-
sgp_
let me try a graph
-
sgp_
I already don't like the graph idea
-
sgp_
-
rottensox
great post sgp_, sarang. enjoyed it.
-
sgp_
do you at least get the goal of what I'm trying to convey?
-
sarang
Maybe compare to likely vs. unlikely events?
-
sarang
Getting a speeding ticket vs. getting struck by lightning
-
sarang
You don't want either, but one of them is much less likely
-
xmrmatterbridge
<atoc> yep speeding ticket is less likely
-
koe
hi math nerds, Im wondering if the MLSAG decoy responses can be theoretically compressed if we change the randomness into hash outputs of the signed message (e.g. h1 = H(m,1), h2 = H(m,2); something like that)
-
koe
I dont know how to compress while hiding the real one, but is it logically possible?
-
koe
by compress Im considering the sum of field elements, e.g. q = a + b
-
koe
or q = a*b
-
koe
and the hiding effect from a truly random number, so generate a random number, compute the hashes, compute the decoy responses from true random and hashes, perform the signature and get the real response, compress the responses, then return one or two scalars which can be used in combination with the known hashes to generate the list of responses
-
koe
and the real response is at an unknown index in that list
-
endogenic
definite progress visually sgp
-
endogenic
solved that problem
-
sgp_
can you elaborate endogenic?
-
endogenic
uh nevermind i thought you renamed it for some reason. this is what i get for doing 4 things at once
-
sarang
koe: I don't see how you could do that while still hiding the signing index
-
koe
would it be reasonable to outsource the problem to other math nerds? here is my outline
justpaste.it/5zdsd
-
koe
would it be worthwhile to offer a bounty (e.g. let you guys focus on your current projects)? if so, would someone mind helping me formalize this? draft 2
justpaste.it/2ounn
-
koe
moreover, where would you even go to propose such a challenge?
-
sarang
I think you can do this by seeding a hash-based chain and including an offset
-
Isthmus
@sgp maybe something like a bee sting, a car accident, a tornado, and a tornado
-
sarang
(if I'm understanding the problem correctly koe)
-
sarang
koe: are you saying you want to be able to generate a sequence `S` such that for a secret index `l` we have `S[l] == v` for some secret value `v`?
-
sarang
and the sequence `S` is uniformly distributed field elements?
-
sarang
Because that is possible
-
koe
where v is the product of a one way function of the other members of s
-
koe
or in other words v can only be determined after all other members of s are known, and v is random
-
sarang
-
sarang
You can select `v` at random after building the hash sequence `S`, and choose the offset `x` accordingly
-
sgp_
Isthmus: hmm, I'll try a few options
-
sarang
In that example, `v` is whatever you want it to be
-
sarang
You could have a set value, or choose it after building the sequence
-
koe
ok lemme see
-
sarang
Maybe this isn't what you're asking
-
sarang
-
koe
well we have MLSAG scalars, and most of them are completely random, so why not offload most of that randomness to a hash function that verifiers can compute as well? then the prover just has two pieces of important info: the real response scalar, and the randomness used to obfuscate which index is the real scalar
-
koe
kind of like how the commitment mask was changed, it's now created out of the transaction public key's randomness
-
koe
not sure that code works, since x is a function of v, so after S += x, ALL the scalars will be functions of v
-
sarang
Yeah, this wouldn't work for MLSAG/CLSAG
-
sarang
Since you need `v` to construct `x` and offset the whole sequence
-
sarang
Unless you operate on each sequence element, the verifier would gain information
-
koe
Im trying to think of a way where, you do an operation on each element, and most of the time information related to v gets canceled out EXCEPT for the element v itself