-
UkoeHB_
how expensive would it be to check that all pub keys in extra field are actually pub keys and not random data?
-
moneromooo
Easy if we change them to be 1/8th of their actual value.
-
sarang
UkoeHB_: the seed has to be unique per signature
-
sarang
But that's doable
-
sarang
If the keys are uniformly distributed from random secret keys, it is not possible
-
sarang
Or are you asking about subgroup testing
-
UkoeHB_
based on how complex the code is it amazes me how fast creating a transaction is, barely 1 seconds
-
sarang
There's a probabilistic way to do batch testing for subgroup membership
-
sarang
But it's statistical
-
UkoeHB_
well group elements have a limited range, so if there is a pub key outside that range then someone must have made a random value, which is useful info to analyst
-
UkoeHB_
idk if it's worth the expense to test
-
sarang
Any key that decodes to a curve point in the G subgroup is equally likely to be random as to be a key generated correctly
-
sarang
Any key that does not belong to the subgroup was not generated correctly
-
UkoeHB_
I mean a random 32 byte scalar, rather than random point. Unlikely and probably not worth code up
-
UkoeHB_
figured something cool out, please take a look! response to sgp_ here
monero-project/research-lab #58
-
sgp_
UkoeHB_: that went well above my head haha
-
vtnerd
I responded to UkoeHB_ on github. You can _usuall_ infer the real spend with just the viewkey, the major exception being when someone uses your output in their ring to send you XMR
-
vtnerd
the probability is somewhat low, but could happen. So you can give some reasonable account balance estimate right now, without any changes to the chain protocol
-
UkoeHB_
Btw viewspent wouldn't be part of the protocol, as everything related to the extra field is unverified. It would require non-trivial code changes though, I think
-
vtnerd
it is part of a protocol - the wallet has to do something different
-
UkoeHB_
And that's a good point vtnerd
-
vtnerd
not part of consensus protocol, yes. just something extra for the wallet todo
-
UkoeHB_
By protocol I mean the minimum rules to get a transaction admitted to the block chain
-
vtnerd
is there a specific use case for this?
-
vtnerd
I think it could be interesting to try the technique I proposed, to see accuracy of it, etc. At the least its a stop-gap if someone wanted that behavior sooner without changing wallet2 and derivatives
-
UkoeHB_
I imagine the current view only wallet, or even the 'highly probable' version you just mentioned, would be adequate in a high stakes corporate environment
-
UkoeHB_
While view wallets are required for those environments for fund security
-
UkoeHB_
inadequate*
-
vtnerd
yeah, an exchange would want accuracy
-
vtnerd
I was thinking about light-wallet frontends. they currently require the spend-key to determine account balance. You should be able to do a view-key only frontend that does a "good enough" job for an individual to monitor the wallet from phone
-
vtnerd
then spend only on some other device
-
UkoeHB_
Since monero adoption is still fairly nascent, a probabilistic view wallet would not have many drawbacks, and would improve the situation greatly. I wonder though if it would hamper long term adoption. It has a psychological effect too, since lack of certainty often weighs disproportionately on people's minds.
-
moneromooo
Are you suggesting a "you might have that much monero, or not" mode ?
-
moneromooo
Sorry if I've got the wrong end of it, it just sounds htat way :D
-
vtnerd
me or UkoeHB_ ?
-
moneromooo
Good question.
-
UkoeHB_
'You probably have that much monero' mode
-
vtnerd
UkoeHB_ wanted a mode that determined the true account balance without the spend-secret-key
-
vtnerd
the initial proposal required changes to how a wallet sends txes for it to work
-
moneromooo
Ah, OK. Sounds good then, ignore me.
-
vtnerd
I pointed out, that you get a _really_ close balance without any changes
-
moneromooo
Yeah IIRC I had a patch for that but it was rejected because it required "honesty" from the wallet owner wrt the auditors.
-
vtnerd
with the unfortunate caveat.
-
moneromooo
By relying on getting change back ?
-
vtnerd
yup. its usually the giveaway to the real spend
-
moneromooo
(ie, sweep_all gets hidden)
-
UkoeHB_
moneromooo: I may have solved that with a new type of proof, that a key image does NOT correspond with an owned output. Very nice for audits :)
-
UkoeHB_
Research Issue #58
-
moneromooo
I think the uncertainty kills it. People will rely on it and complain when it's wrong.
-
moneromooo
And if it's uncertain, it's pointless, isn't it. The main use people want is to ensure they can see when their money is stolen.
-
moneromooo
Which relying on change does not help.
-
moneromooo
Says a lot about crypto btw, if the main use is "seeing when my money gets stolen"...
-
vtnerd
hmm. yeah, if any of this dependent on sender behavior, then they "hide the steal". I love that phrase lol
-
UkoeHB_
viewspent may also not work for verifying stolen funds, since a thief may edit out the curve point
-
vtnerd
although, if you are watching someone steal your XMR, its already too late lol
-
UkoeHB_
KoH wa
-
UkoeHB_
Typo. Only way to know for sure is with the key image
-
vtnerd
this is unfortunate, because the ability to view an account balance with just the viewkey on a phone to a light-wallet-server is kind of nice. But the false impression under adversarial cases ... :/
-
vtnerd
or maybe if the UI said (in fine print) : "*Account balance shown might not be real" like one of those drug ads
-
vtnerd
then we're covered
-
UkoeHB_
The basic problem is view keys are not part of the consensus protocol. An alternate wallet may use single-key one time addresses, and ignore the view/spend concepts
-
UkoeHB_
So no kind of solution that doesn't involve the consensus protocol will solve it
-
UkoeHB_
Fine print! Of course! Time to update the roadmap
-
sarang
The idea of a point-in-time "account snapshot" using key images and proofs-of-non-spend could be useful
-
sarang
Where the improvement is not leaking unspent information
-
UkoeHB_
I think the problems with current view-only are, in order of importance: a) unable to view entire balance, b) unable to cooperate with audit without leaking unspent info, c) unable to know when theft has occurred. (a) is partially solved by probabilistic view balance, and fully solved by viewspent keys. (b) is solved by proofs of unspent, assuming person being audited has spend key and auditor has view key.
-
UkoeHB_
(c) is unsolvable without consensus changes.
-
UkoeHB_
Although auditor knowledge of view key is still problematic, since they can keep that key forever
-
UkoeHB_
At least in the immediate audit they don't learn more than necessary
-
UkoeHB_
Don't see a way around auditor knowing view key, since they must be able to know all the owned outputs.
-
sarang
The traditional use case for audits has been presented as the "club treasurer" problem
-
sarang
Where Alice is the treasurer for her club, and wants to show the members the balance is as expected
-
sarang
So there's not much of a threat model, and a point-in-time balance test might be sufficient
-
sarang
Members can use the view key to see incoming funds, and can request that Alice provide a point-in-time proof as needed to check the balance
-
UkoeHB_
Makes sense
-
sarang
and it doesn't involve changes to transaction structure etc.
-
sarang
Alice runs the point-in-time tool, and the members verify it with their own tools
-
sarang
While more robust handling of balance would be nice, I think it'd be a marginal benefit (at best) for a big cost in terms of development and chain bloat
-
sarang
Anything optional and sender-only seems to be useful more as a view-only convenience, not an absolutely-to-be-trusted-under-all-use-cases application
-
sarang
and then you have to weigh the practical convenience against the development cost and bloat
-
sarang
Maybe a good discussion is to identify the use cases for transaction/wallet proofs and assertions that are "must haves"
-
sarang
And see how well the existing options handle those cases, or could be adjusted to do so
-
sarang
Right now we have InProofs and OutProofs and ReserveProofs and SpendProofs
-
sarang
InProofs and OutProofs are being updated but would retain their same functionality
-
gingeropolous
i dunno about the whole thing. if we're really trying to be like cash, how does this concept fit in?
-
moneromooo
I think it'd useful, but it'd have to be always segregated from the balance, like "likely balance if no corner case happened, and exchange key images for certainty".
-
UkoeHB_
Let's set aside the sophisticated adversary for a moment. It seems like an improved view only wallet would be very beneficial to the ecosystem, and would go a long way toward making Monero user friendly. There are now two options on the table: probabilistic view that depends on change output heuristics, and viewspent keys that show an exact balance. I expect high volume wallets would not be able to rely on
-
UkoeHB_
the probabilistic view, while viewspent keys certainly lost the chain. Both entail development costs
-
moneromooo
Because if not, you'll get tons of people complaining monero's buggy, even if they had to click on a "I understand it might not be right" button.
-
gingeropolous
i think the viewkey functionality was just a side effect of how the monero system works. they went "oh, the way we designed it allows us to do this" kind of thing
-
sarang
UkoeHB_: for what specific use cases?
-
sarang
I don't want to fall into the "surely it would be handy" trap
-
sarang
because we can't make good cost-benefit analysis from that
-
UkoeHB_
For anyone using a view only wallet
-
sarang
OK, for what use cases
-
gingeropolous
but I don't fully understand the viewkey/spendkey. But from what I sorta understand, its not like monero could use a single viewspend key to do what it needs to do
-
gingeropolous
if you show someone your wallet full of cash they can take it
-
moneromooo
You can have the view key derived from the public spend key (giving a truncted address).
-
UkoeHB_
View only wallets are helpful when your spend keys are not easily or safely accessible.
-
sarang
OK, what are the trust requirements?
-
sarang
Any solution that can be reasonably gamed needs to be only a convenience feature
-
sarang
and we'd need to specify interactive (like Alice providing a point-in-time proof set) or non-interactive (only needs the chain data)
-
UkoeHB_
Trust requirements?
-
sarang
You could imagine use cases where you intend any view functionality to be used by you for convenience, so you can trust yourself to not mess with your own transactions and screw it up
-
sarang
But there could be other cases where you don't trust the prover/keyholder to do this
-
UkoeHB_
gingeropolous: current view only just shows all the outputs you received, not if you spent any of them. viewspent shows which are spent directly (assuming honest person or unsophisticated thief spent them). Probabilistic view estimates balance based on outputs you receive from tx where a previous owned output is referenced (probably spent, and the one you received is the change).
-
moneromooo
Unsophisticated thief who manages to steal coins from a cold wallet ? :)
-
UkoeHB_
Or just a thief who doesn't care
-
gingeropolous
what is the currency parallel here? not that existing things should restrict future things....
-
sarang
I like the club treasurer model because it's an example of a partial trust. The club members don't trust Alice enough to let her simply have the wallet with no oversight, but they might trust her enough to provide monthly point-in-time proofs to assure that everything is ok
-
sarang
And that model has reasonable solutions
-
UkoeHB_
Financial analysts know a lot about company finances, but can't spend any of the money. And in fact the records may be fake or incomplete
-
gingeropolous
yeah but thats not the money doing that. thats some institution
-
UkoeHB_
sarang I'll have to think about that carefully for a bit
-
UkoeHB_
gingeropolous: the blockchain is just a ledger, a cash metaphor breaks down under too much scrutiny
-
sarang
Including something that's optional and can be gamed by a dishonest party might work in the case where you trust yourself, but that probably incurs a big cost for the entire ecosystem and wouldn't address more stringent trust models anyway
-
gingeropolous
yeah thats more true of a transparent ledger. monero's ledger is more a history of mathematical proof that everyones playing the same game
-
sarang
Off-chain stuff is point-in-time and interactive, but can be made hard to game and does not incur ecosystem-wide costs
-
sarang
If you don't need any of the point-in-time proof stuff, you don't ever need to care about it
-
UkoeHB_
I'm curious about wallets in open ledger coins (everything except monero). What is the prevalence of spend-authority wallets vs non-spend authority wallets/balance checkers?
-
gingeropolous
you don't need wallets to do it.
-
sarang
Any explorer could do it
-
sarang
Oh, but you mean with multiple derived addresses
-
gingeropolous
for the club treasurer model, it would be cool to do something where you can send someone an output that is effectively a fake transaction
-
gingeropolous
maybe thats what you were talking about
-
sarang
?
-
gingeropolous
point-in-time proof set
-
sarang
I meant that when the members only have the view key, they don't have full insight into Alice's spending
-
sarang
but they can request/require point-in-time proofs to account for the balance
-
sarang
and presumably fire Alice if anything shady happened
-
gingeropolous
like, i could imagine a new type of transaction, where it is formed in much the same way, except the output that is created isn't spendable, and it doesn't actually nullify the outputs it used as inputs
-
gingeropolous
so the only way to create that new output thats worth 20 XMR is if you had the 20 XMR to create it
-
sarang
The MLSAG asserts that one of the input ring members was used as the signer
-
gingeropolous
so you can send that tx to someone, and they can reasonobly conclude that indeed you have 20 XMR
-
sarang
You can always generate an "output to nowhere"
-
gingeropolous
of course, one could spam the chain with these things
-
gingeropolous
but they would cost the same tx fee
-
sarang
or an output addressed properly but with bad commitment data, for example
-
sarang
(this would not be spendable)
-
sarang
but at that point your wallet detects this and says no-good
-
gingeropolous
well thats just wallet and consensus rules
-
sarang
Isn't everything? =p
-
gingeropolous
indeed! Blue skies baby!
-
UkoeHB_
"Any explorer could do it" smh
-
sarang
?
-
sarang
Look at an address balance?
-
gingeropolous
smh = so many hamsters
-
UkoeHB_
yeah lol, the fungibility maximalist in me shakes his head
-
sarang
oh
-
sarang
I thought you weren't sure about that claim
-
UkoeHB_
would your position change for viewspent with Triptych, since the extra scalars are there?
-
sarang
I thought the key image format mechanism could allow for the same functionality, but it doesn't appear so
-
sarang
Triptych et al. use nonlinear key images
-
gingeropolous
thats my favorite kind
-
sarang
You can still store up to 64 bytes of arbitrary data per input proof, to be clear
-
sarang
But the linking tag format for output private key `x` is `J := x*U`, where `U` is a globally-fixed group element
-
sarang
sigh
-
sarang
typo
-
sarang
`J := (1/x)*U`
-
sarang
FWIW Omniring can support the existing tag format
-
sarang
but it isn't clear to use that format with multisignatures
-
UkoeHB_
ah so next gen of protocol may not even support viewspent; does it still support current view capabilities?
-
sarang
The proof system doesn't care how you derived your output keys
-
sarang
Just like how MLSAG/CLSAG don't care
-
sarang
Everything's a commitment, and some things are commitments to zero :D
-
sarang
However, I was thinking about if/how the hiding could be safely done in CLSAG
-
sarang
where all round scalars are random except for the scalar at the signing index
-
sarang
So you could generate all but the signing scalar via PRNG, and hide the data in one of those
-
sarang
and have a rule about where it's hidden (e.g. the index after the signing index)
-
sarang
provided the scalars are still independent and uniformly distributed, adversaries can't detect which is hiding the data
-
sarang
and if you know which output is yours, you know where to look in the ring
-
UkoeHB_
makes sense
-
UkoeHB_
we could do that right now with MLSAG scalars
-
UkoeHB_
of course they are pruned which is problematic
-
sgp_
I think we need to differentiate two main uses of the view key
-
sgp_
One is the MyMonero wallet scanning type, where we want the LEAST info revealed to optimize efficiency
-
sgp_
Another is the audit functionality, where presumably it would be great to have the same view as the spend key holder
-
UkoeHB_
to optimize efficiency <- if you mean scanning time, both viewspent and probabilistic would involve insignificant time compared to actually finding owned outputs in the first place (basic view key function)
-
sgp_
UkoeHB_: I took an ever bigger step back into the reasons why you would want to hand over a view key in the first place
-
sgp_
in the first case, I want as many barriers to preventing someone from figuring out which outputs are actually spent as possible
-
sgp_
in the second case, I would want to be 100% sure it can't be gamed
-
sarang
I'm going to switch the conversation to something more timely
-
sarang
If the intent is to have CLSAG code reviewed, there needs to be a scope specified for this
-
sarang
^ moneromooo etc.
-
sgp_
what do you need help on when defining scope?
-
sarang
At a high level, we need to tell the auditor what to review
-
sarang
At one level, there's "we ripped out X and directly replaced it with Y", which is true for some functionality
-
sarang
Ideally this would assert that the CLSAG implementation is _at least_ as secure as the MLSAG functionality was (but that was never externally reviewed)
-
sarang
Or it could be extended out somewhat to other parts of the tx protocol, but then the "stopping point" becomes less well-defined
-
sarang
and eventually it's the whole damn codebase =p
-
sarang
Separately, the math is reviewed... and the CLSAG code is checked against that as well
-
sarang
I await news from suraeNoether on some further updates to the paper we've been working on to really ramp up the security model
-
sarang
(and none of which presently change the sign/verify algorithms)
-
moneromooo
If it's.... name escapes me.... they already reviewed MLSAG, so it's easy. Review the patch. And apparently Tim Ruffing (IIRC ?) was willing to review the made side (though not sure how this differs from what he did in the first place).
-
sarang
Right now there are 3 commits that relate to this, from older to newer:
-
sarang
?
-
sarang
There was an audit group that reviewed a secp256k1-based implementation of MLSAG, is that what you mean?
-
sarang
AFAIK that was _not_ any review of the Monero implementation
-
moneromooo
Unlikely.
-
moneromooo
I'm talking about the people who went to review a load of things then came back to say "it was more htan we expceted, can we get some more money" ?
-
moneromooo
They were hired for bulletproofs but pulled all the other stuff in.
-
moneromooo
Not X41.
-
sgp_
quarkslab
-
moneromooo
Quarkslib\
-
sgp_
I didn't realize they asked for more money
-
sarang
If it ends up being "review the patch", then that's a nicely defined scope
-
moneromooo
Maybe I'm confusing with another ?
-
sgp_
they went beyond scope. that was them
-
sarang
I'll need to review their report, but I don't believe it extended to a complete review of MLSAG
-
sgp_
I didn't think so either
-
moneromooo
Well, part of it anyway. Still, whether they did or not does not really change the point.
-
sarang
And we'd need to list obvious caveats: "yes, we know this isn't constant time"
-
sarang
"yes, we know this is not a prime-order curve"
-
sarang
Looks like total patch for the 3 relevant commits is ~1800 lines
-
sarang
Main functions to compare to the math are only ~200-300
-
sgp_
what's the next realistic scope cutoff? best guess
-
sarang
One extension could be to the way commitment offsets are used to form the input rings to MLSAG/CLSAG
-
sarang
and the balance assertion via commitment sums
-
sarang
It's one of those "how much time and money ought to be spent"
-
sarang
Presumably, reviewing the 3-commit patch would assert that CLSAG is at least as solid an implementation as existed before
-
UkoeHB_
might tie in nicely with bulletproofs, since those take as inputs the commitments
-
sarang
Our initial bulletproofs deployment was heavily reviewed
-
sarang
(but note that it has been updated in the meantime)
-
sgp_
What would 1-2 broader scope audits look like for the cost of 3 just on clsag?
-
sgp_
(narrow clsag)
-
sarang
Right now I know of only audit group that indicated availability and interest: Teserakt
-
sgp_
I'm sure there will be more when we ask, no?
-
sarang
OSTIF did
-
sgp_
ostif asked kudelski, quarkslab, etc?
-
sgp_
they all said no interest?
-
sarang
FWIW the complexity of MLSAG -> CLSAG is far less than that of Borromean -> Bulletproofs
-
sarang
There was a lack of confidence in the expertise needed to review the math/proofs
-
sgp_
I wonder if broadening the scope will get them interested
-
sgp_
ah
-
sarang
There would be _some_ benefit to having a group review only the code, but having one group that understands both deeply has its advantages
-
sgp_
why could they find people for bulletproofs but not clsag? is it a different type of complexity?
-
sarang
and Teserakt is well qualified
-
sarang
They weren't reviewing the math
-
sarang
only the implementation's match to the paper
-
sgp_
how important is the math review?
-
sarang
Very
-
sarang
It's new math
-
moneromooo
Wait, I just realized I confused things with my comment above about Tim reviewing math. That was BPs.
-
sarang
You're thinking of Benedikt?
-
sgp_
and bulletproofs wasn't because it was old math, or that everyone else in the world already reviewed it?
-
moneromooo
I might,
-
sarang
Who reviewed our prototype?
-
sarang
Benedikt was the author of the BP paper
-
moneromooo
Yes, I am. Thanks.
-
sarang
sgp_: Bulletproofs had its math/proofs heavily scrutinized already
-
sgp_
got it
-
sarang
CLSAG has not received that level of scrutiny
-
sarang
I would not advocate deploying without a proof review
-
sgp_
how realistic is it to get published in another paper?
-
sarang
I happen to be confident in the math, but I am naturally biased
-
sarang
Tough
-
sarang
There's waaaaay more new work than spaces/eyes available for peer review
-
sarang
It's a losing battle to wait and hope for inclusion in proceedings, and there's no guarantee of the quality of review
-
sarang
(plus it'd be anonymous)
-
sgp_
I would think "this is going to be deployed in an open-source, billion dollar project" would help a bit, but academia is weird
-
sarang
I'd rather have a known entity (JP) review it
-
sarang
Academia is busy
-
sgp_
I'm moreso getting at both
-
sarang
And you get no credit for reviewing a paper outside of a journal/proceedings
-
sarang
I certainly plan to submit CLSAG to PoPETS, no doubt
-
sarang
But it often takes several submissions with different deadlines
-
moneromooo
Political... pets ?
-
sarang
perhaps
-
moneromooo
Proceedings of...
-
» moneromooo goes lookup
-
sarang
-
moneromooo
I knoew it, it's about pets.
-
sgp_
pet symposium is a dumb name
-
sgp_
police pets
-
moneromooo
I feel... all fuzzy inside knowing such a thing exists ^_^
-
sarang
FWIW, the CLSAG security model is already better than that of MLSAG
-
sarang
But we're trying to improve it even more to handle some cases that LSAG/MSAG did not
-
sgp_
by better security model, does that essentially mean you feel more confident in the math of clsag than mlsag already before review?
-
sarang
Yes, assuming our proofs are correct
-
sgp_
did Teserakt give a rough estimate for the narrow scope review?
-
sarang
So far, informally it'd be the patch changes
-
sarang
TBD more specifically
-
sarang
Cost ~7200 USD for code, and another ~7200 for math/proofs
-
sgp_
we should split off the math/proofs and compare other providers for the code portion (including varying scopes)
-
sarang
Just to be clear, the fact that we're changing the security model doesn't mean there are exploitable problems with LSAG/MLSAG
-
sarang
only that the proofs couldn't guarantee the non-existence of certain edge cases
-
sarang
"lack of proof of non-existence" != "existence"
-
sgp_
got it
-
sarang
Hiring someone else for code review would certainly involve billable hours just to get familiar with the paper
-
sarang
which is built in to the Teserakt stuff already (same people doing both)
-
UkoeHB_
could you recruit other crypto researchers to do reviews, as standin for academia which may be inaccessible?
-
sarang
If you know people with time and interest, go for it
-
sarang
We'll have the preprint updated on IACR as soon as the updates are done
-
sgp_
I'd still like to see what it looks like to compare firms for the code reviews of narrow and medium scopes
-
UkoeHB_
all the people I know are already working on it :p
-
sarang
"Get peer review" is one of those things that is always harder than it sounds, even when it sounds hard
-
sarang
I can ask Derek at OSTIF if any of the other firms would be interested in code-only reviews, given the new timeline (or lack thereof)
-
sgp_
yes, I think that would be great
-
UkoeHB_
it sounded like the security proofs are pretty novel, would that inspire peer review?
-
sarang
The proofs techniques aren't novel
-
sarang
the security model is different than other LRS definitions, though
-
sgp_
and have Teserakt clearly specify quotes for (math), (math + narrow), (math + medium)
-
sarang
Depends what those scopes mean specifically
-
sarang
Math is a defined scope
-
sgp_
yeah of course, I mostly defer to your and moo's judgement on the code scopes
-
sarang
but "narrow" and "medium" require a "these commits / these files / these functions" listing
-
sgp_
"medium" to me means "what's the next reasonable 1 thing that could be audited by extension"
-
sarang
Oof
-
sarang
I'd like to know what moneromooo thinks of that question
-
sgp_
you only get to pick one, choose wisely :p
-
sarang
I can think of conceptual scopes, but it isn't clear what tentacles that extends into the recesses of the codebase
-
sgp_
sounds like moo can help define that
-
sarang
If we can get a nice limiting scope for commitment offsets and balance assertion, that'd be my pick
-
sarang
since that's the crux of the transaction model
-
sarang
UkoeHB_: this is where something like ZtM could come in handy, as the closest thing to a written spec
-
moneromooo
How to define the scope between math and code ?
-
sgp_
now we're getting somewhere
-
sarang
moneromooo: no, just what code to review
-
moneromooo
The patch seem like a good target.
-
sarang
They'd check that the CLSAG_Sign/Verify functions do the Right Thing
-
moneromooo
As in "it does not introduce any flaw".
-
sarang
Right, that's a narrow scope
-
sarang
sgp_ asked about the "next biggest useful scope"
-
moneromooo
As in "we did not find any flaw it introduces" :)
-
moneromooo
Well, given it pulls things which pull things... that'd be the whole protocol really.
-
sarang
that was my worry
-
moneromooo
And given we might switch to omniring/triptych/rct3/lelantus, it seems not worth it at this point.
-
sarang
At least the patch would show "no less secure than however secure it was before"
-
sgp_
can we say "treat this as a black box and lob this off?" throwing out ideas, not dictating
-
sarang
OmniTripLantus3
-
UkoeHB_
I can do a CLSAG writeup of how it would be implemented if that would help getting reviewed. At this point I should be doing CCS since my work is getting way off ZtM2 scope
-
sarang
UkoeHB_: that's what the paper is for
-
sarang
we already have that
-
sarang
It would be useful if more of the RCT protocol were in scope
-
sarang
However, I'm sure Teserakt would find ZtM useful to help them understand how MLSAG/CLSAG fit in to the tx protocol (basically a drop-in replacement)
-
sgp_
if there's no good way to define a medium scope, then it's probably best to not do one
-
UkoeHB_
if it's drop in then not much is actually changing
-
sarang
Anyway, most of this is a moo point until the paper gets the thumbs-up
-
sarang
UkoeHB_: it's still like 1800 lines
-
sarang
There are underlying crypto functions that were custom-written to speed things up
-
UkoeHB_
well in terms of how the transaction protocol fits together
-
sarang
and integration code
-
sarang
Yes, there's basically no change to how the tx protocol works
-
sarang
Hence the idea of narrow scope
-
sarang
that's what I meant
-
UkoeHB_
gotcha
-
sarang
but it's still a non-trivial change in code, even if it's a small change in the math
-
sarang
The old math didn't have formal security definitions that we liked
-
sarang
So the non-triviality in math exists mainly because of the security model change
-
sarang
The handling of linkability and non-frameability was super limited, for example, and had strong assumptions
-
sarang
Well at least we have some agreement on a scope, which is good
-
sarang
moneromooo: when it comes time to send the list to the auditors, should they review the 3 commits in your crash branch?
-
sarang
Or is there a PR for changes
-
sarang
I plan to send them any commit/PR lists, the CLSAG preprint, and ZtM as a reference for MLSAG and the overall tx protocol
-
moneromooo
Let me know and I'll rebase first.
-
sarang
OK, will let you know
-
sarang
UkoeHB_: what version of ZtM is most appropriate for this use case?
-
sarang
Assume that it would get sent in a week-ish
-
moneromooo
And I'll make a branch just for it.
-
sarang
great
-
moneromooo
I hope it still works ^_^
-
sarang
moneromooo: did that silly extra-data-in-hash issue get fixed too?
-
sarang
heh
-
moneromooo
What is the silly extra-data-in-hash issue ?
-
sarang
I pointed out a few lines in the sign/verify routines where space in hash input was allocated and zeroed, but never used
-
sarang
It was along with a note about serialization that you'd already addressed
-
moneromooo
Ah, a few days ago ? I've got that here, yes.
-
sarang
great
-
sarang
That was the only change I noticed (and it wasn't security related obviously, just a waste of spacetime(
-
UkoeHB_
Probably the latest draft, since rcttypefull has been deprecated
-
UkoeHB_
Just missing bulletproof really
-
sarang
And that's most definitely out of scope
-
sarang
I'll ping you again before I send it, to confirm the right draft
-
UkoeHB_
Sounds good
-
sarang
thanks UkoeHB_
-
sarang
ZtM wins again
-
UkoeHB_
🥳
-
UkoeHB_
did a brief analysis of txtangle, assuming 1% of current tx volume is converted, is 230 participant tx per day, for about 9 per hour, so 15-30mins per txtangle, at around 0.05-0.10 USD per output to be financially viable
-
UkoeHB_
coinjoin is at 4% volume but that's an open ledger, and bitcoin is easier to implement
-
sarang
Plz define txtange
-
UkoeHB_
join protocol
-
sarang
and why 1% would be expected
-
UkoeHB_
just an approximation based on coinjoin adoption
-
sarang
How is txtangle != joinmocoinjoin
-
UkoeHB_
expected adoption is lower since monero is already not an open ledger
-
UkoeHB_
its a better name
-
UkoeHB_
and coinjoin means bitcoin]
-
sarang
OK so, "txtangle" == "input joining" or whatever generic term we wish to use
-
» sarang likes terms to be defined
-
UkoeHB_
sry :p
-
sarang
Whenever I see an undefined term that sounds cool, my subconscious assumes it's a marketing thing and automatically recoils =p
-
sarang
Unless I came up with the term, in which case I am proud of it :D
-
sarang
Also, "tangle" means something else depending on what projects you know of :/
-
UkoeHB_
whatever! it's mine now!
-
sarang
I am cool with reclaiming that word
-
sarang
it's a cool word
-
sarang
I mean, I only chose the term "Triptych" because I got sick of saying "the new LRS construction proposed in issue #XYZ"...
-
sarang
and you only get media attention with a badass name
-
UkoeHB_
i figured koejoin was way too much ego ;p
-
sarang
You can call it whatever you want! But you need at least 51% of nodes to agree on the name
-
sarang
I was told during my math training that you can't name something after yourself; someone else needs to
-
UkoeHB_
shit need to work on my outreach
-
MRL-discord
<Isthmus> Crap, I ran out of money and my IRC cloud account got cancelled
-
MRL-discord
<Isthmus> I get paid at midnight PST
-
MRL-discord
<Isthmus> Please don't talk about anything interesting for the next few hours
-
MRL-discord
<Isthmus> plz n thx
-
UkoeHB_
there is monerologs.net
-
UkoeHB_
you should definitely read the entire scroll back asap :)
-
sarang
^
-
sarang
Who runs monerologs?
-
sarang
It's a great interface