-
UkoeHB_
overleaf borked for anyone else?
-
derpy_bridge_
[keybase] <surae>: Was fine for me a few hours ago
-
Isthmus
Hey y’all sorry I’ve been AWOL
-
Isthmus
Did we solve privacy yet?
-
Isthmus
Also, I want in on this Keybase bridge
-
Isthmus
How much do you think subaddresses are used?
-
Isthmus
I’m going to poke at the data tonight, and probably post spoilers tomorrow. So if you want to place your bets, do so now
-
derpy_bridge_
[keybase] <surae>: I don't want to speculate about that
-
sarang
-
sarang
-
sarang
starts in ~2 hours
-
sarang
-
sarang
Stanford conference livestream is starting now
-
sarang
Research meeting here starts at 18:00 UTC (about half an hour from now)
-
Isthmus
Aw nobody took the bait on guessing subaddress adoption
-
Isthmus
I'll be around for a few minutes, but have some outlier meetings this morning
-
nioc
peanut gallery says significant
-
sarang
Do you want to present data right away? Or before meeting?
-
sarang
^ Isthmus
-
UkoeHB_
I don't think it will be too much, maybe 10% or less. AIUI most tx volume is exchange related. Though maybe exchanges do use them, in which case 30% not surprising
-
sarang
OK, let's get started with the meeting
-
sarang
GREETINGS
-
sgp_
hello :)
-
n3ptune
Hello
-
» needmonero90 waves
-
needmonero90
I caught the meeting!
-
needmonero90
I would like to note that the meetings are not listed in the calendar
-
needmonero90
idk if thats intentional
-
sarang
Which calendar?
-
UkoeHB_
Hi
-
sarang
And how are meetings applied to it?
-
ArticMine
Hi
-
sarang
Meeting times/agendas are always listed as meta repo github issues
-
sarang
Anyway, does anyone wish to begin the ROUNDTABLE with research topics of interest?
-
UkoeHB_
Yes
-
sarang
Take it away UkoeHB_
-
UkoeHB_
I finished designing an escrowed marketplace 'protocol' which hopefully solves issues encountered by rbrunner in his openbazaar integration analysis. Also, multisig and txtangle have been finalized.
-
UkoeHB_
-
sarang
Neat
-
UkoeHB_
Finally, I had an idea for reducing minimum fee variability, and likewise for putting antispam directly in the protocol instead of relying on minimum fee
-
sarang
Are you seeking analysis on those?
-
UkoeHB_
Which is issue #70
-
UkoeHB_
They are open for comments any time anywhere
-
UkoeHB_
Ah and sarang provided a draft for a tx knowledge proof chapter
-
sarang
aye
-
UkoeHB_
(not really my research :p)
-
sarang
Heh, it's more of a summary of what's in the codebase (and some changes)
-
sarang
I look forward to reading the update draft you linked
-
UkoeHB_
A number of topics here are lonely and want attention btw
github.com/monero-project/research-lab/issues
-
UkoeHB_
\end
-
sarang
Thanks UkoeHB_
-
sarang
Any questions or comments on those topics from anyone?
-
ArticMine
Yes
-
sarang
Please go ahead!
-
ArticMine
I have taken a look at issue 70
-
ArticMine
It actually has serious implications
-
ArticMine
When the LT medium increases substantially
-
ArticMine
I do have an idea for a solution
-
ArticMine
Very preliminary at this stage
-
ArticMine
As for an interim fix
-
ArticMine
The est is to pay the high or at least normal fee for escrows that are expected to last past the next hard fork
-
ArticMine
I will have comments on the issue in the next two weeks
-
ArticMine
end
-
sarang
Thanks ArticMine
-
sarang
Any other questions/comments from the topics presented by UkoeHB_?
-
sarang
Righto
-
sarang
I'll share a few things
-
sarang
First, the Stanford Blockchain Conference is happening right now (and the next couple of days), and has streaming available:
cbr.stanford.edu/sbc20
-
sarang
Second, I did some math/code related to multiparty stuff for next-gen protocols
-
sarang
Third, I worked on code and write-ups for transaction proofs, both for an updated PR and for inclusion in Zero to Monero for better documentation
-
sarang
Fourth, I used chain data from n3ptune and friends to do better estimates of the cumulative effects of next-gen protocols
-
sarang
both in chain growth and verification time
-
sarang
Major caveat: these assume the same input/output distribution as the current chain, and are _estimates_only_
-
sarang
and apply to post-bulletproof chain data only
-
sarang
-
sarang
^ this link shows the total chain growth estimates for various protocols with varying ring size
-
sarang
namely, from 16 to 1024 in powers of 2 (lines for visual aid only)
-
UkoeHB_
Sarang would you mind adding an indicator for MLSAG and CLSAG at the 11 ring size 'point'? For reference
-
sarang
Sure, let me grab that data from my spreadsheet
-
sarang
hold please
-
UkoeHB_
Or the super steep slope from 11 to 20 lol that goes off that chart
-
sarang
Heh, I had that data but didn't include it since it's crazy linear
-
sarang
I'm running the N=11 code for MLSAG/CLSAG, which I don't have handy
-
sarang
Anyway, I'll pull up the time data while we wait
-
sarang
-
sarang
^ verification time estimate for _group_operations_only_ at varying ring sizes
-
UkoeHB_
I think it's interesting that all these protocols/signature schemes are similar size on the small end
-
sarang
All the verification times are linear (up to a logarithmic term due to multiexp)
-
UkoeHB_
Where is tryptich multi hiding?
-
sarang
It's underneath Triptych-single
-
sarang
They're essentially indistinguishable
-
selsta
Does Triptych single have advantages over multi?
-
sarang
RCT3-multi suffers due to input padding requirements that still have a linear verification effect
-
sarang
selsta: a complete soundness proof :)
-
sarang
Update on MLSAG/CLSAG size estimates...
-
UkoeHB_
Could you make a smaller graph from 0 to 128 ring size? Since those large ones seem pretty unreasonable
-
sarang
At N=11, MLSAG for that chain range is 7.84 GB, while CLSAG is 5.84 GB
-
sarang
(the actual size of that chain range is 7.9 GB)
-
sarang
-
sarang
^ same time data, zoomed in
-
UkoeHB_
Perfect thanks :) are time estimates for CLSAG/MLSAG available?
-
sarang
Heh, just writing that out
-
sarang
I have very early estimates on that, which are tricky since multiexp doesn't apply, and hashing is nontrivial
-
sarang
MLSAG N=11 estimate is 29.9 hours for that chain range (but I have _not_ double-checked it)
-
ArticMine
What hardware was used for the verification time calculations?
-
sarang
It's a single core on a 2.1 GHz Opteron machine, with a bonkers amount of RAM
-
sarang
I would rely on the timing data only for comparisons, not absolute values
-
ArticMine
age of CPU?
-
sarang
I am still in the process of getting CLSAG data, which requires additional test code
-
sarang
It's a gen-3 Opteron, if that's what you mean
-
UkoeHB_
Is there a way others could run the same tests?
-
sarang
Again, only estimates using performance test code
-
sarang
For next-gen protocols, it's quite easy
-
ArticMine
Yes great it does give an idea thanks
-
sarang
Well, somewhat easy
-
sarang
You need to get multiexp performance timing data and use a linear interpolation that you plug into the simulator
-
sarang
For MSLAG/CLSAG you need to run more operation performance data
-
sarang
-
» Isthmus ducks in for 30 seconds
-
Isthmus
-
sarang
But again, it's tricky to do comparisons between MLSAG/CLSAG and the next-gens
-
» Isthmus ducks back out
-
Isthmus
(drive by data)
-
sarang
Wow, that's quite low
-
Isthmus
Oh yeah, the numbers are one thing. But moreso, we should all be more alarmed that analyzing something like this is possible for an outside observer
-
Isthmus
;-)
-
sarang
Yep, and has certainly been a topic of interest!
-
Isthmus
It's a privacy risk to use subaddresses right now...
-
Isthmus
Anyways, I gotta bounce, sorry to spam n run
-
sarang
OK thanks for sharing the data Isthmus
-
sarang
Another good reminder that I/O structure reveals some information about subaddress use
-
sarang
Since Isthmus had to leave, were there other questions/comments on the data that I shared above?
-
sarang
UkoeHB_: if you want to run tests as well, let me know after the meeting and I can let you know how to get the numbers you'll need
-
UkoeHB_
My computer is quite weak, was just asking for viewers :)
-
sgp_
sarang: can you remind us on the plans to fix this subaddress thing?
-
sarang
ah ok
-
sarang
Requiring separate tx keys per output is a good idea, but IIRC didn't have a huge amount of support when last brought up
-
sarang
FWIW the size data that I presented for next-gens assumes a separate tx key per output
-
UkoeHB_
Is that necessary for the protocols?
-
sarang
For the proving systems, you mean? No, not at all
-
sarang
They don't care how you get signing keys
-
UkoeHB_
Can you estimate the amount of additional pub key data? Num outs * 32 and num tx * 32?
-
sgp_
sarang: why did it not get support now? complexity? size? verification time?
-
sarang
My numbers for MLSAG/CLSAG include separate tx keys too!
-
sarang
Also: n3ptune's dataset includes the pubkey counts
-
sarang
So I could run that separately for a more direct count
-
UkoeHB_
With only 3% subaddress adoption, the difference is likely on the order of 100MB
-
UkoeHB_
Or 2% of total size I think
-
sarang
that's probably a good order-of-magnitude estimate
-
sarang
But IIRC scanning requires checking all pubkeys
-
sarang
So either there needs to be a specified correlation, or there's added complexity in scanning
-
UkoeHB_
I think it costs ~1GB for 30mill pub keys btw
-
sarang
I think moneromooo had a better idea of the impacts, when it was brought up earlier
-
sarang
FWIW I think it's a good idea unless it's very compelling not to due to complexity
-
sarang
OK, we're running up to the one-hour mark...
-
sgp_
obviously without this change, the impacts are quite negative for network privacy........
-
sarang
It's differentiated data, but it doesn't leak _which_ outputs are subaddress-destined
-
sarang
(not that I'm saying that's a good reason to keep the current approach)
-
UkoeHB_
It's quite a lot of unused data, I'm a bit skeptical
-
sgp_
just reveals "one of this outputs goes to a subaddres?"
-
sarang
UkoeHB_:?
-
UkoeHB_
A lot of dummy data
-
sarang
sgp_: it reveals the number of subaddress outputs
-
UkoeHB_
sarang all it reveals is at least one of the outputs must be to a subaddress
-
sarang
Doesn't it reveal the total number of sub outs?
-
UkoeHB_
No
-
sarang
orly
-
UkoeHB_
How would it?
-
UkoeHB_
Number of additional pub keys always equals number of outs
-
UkoeHB_
Even if nonsubaddress
-
UkoeHB_
How is the CLSAG paper going?
-
sarang
Hmm, for some reason I thought otherwise; noted
-
sarang
I'm still waiting for suraeNoether
-
sarang
He wanted to continue working on his ideas for the security model
-
sarang
So unfortunately I am not the one to ask
-
sarang
OK, is there anything else of interest to share?
-
sarang
(Would be a good idea to continue discussing this after meeting, or on an issue, to keep it alive)
-
sgp_
definitely need an issue for it
-
sarang
All righty then; thanks to everyone for attending today
-
sarang
We are adjourned!
-
gingeropolous
<UkoeHB_> Could you make a smaller graph from 0 to 128 ring size? Since those large ones seem pretty unreasonable >> UNREASONABLE?
-
sarang
And just in time... the next Stanford talk is about Monero and Zcash network issues that were reported and resolved
-
UkoeHB_
Two weeks later, the blockhain is synced!
-
gingeropolous
sarang, are those tests on my poor old opterons?
-
sarang
aye
-
sarang
for consistency
-
sarang
Again, best not to use them as absolute numbers, but for comparisons
-
ArticMine
I am not so sure I would consider ring sizes of 512 or 1024 unreasonable
-
gingeropolous
curious what the existing verification time is for the same region on those things.
-
UkoeHB_
Increasing verification time over mlsag/clsag feels like a step back
-
ArticMine
This would depend on verification time with typical current hardware so it is about absolutes
-
gingeropolous
the physical CPU for those machines is
-
sarang
gingeropolous: my operation-count estimates for MLSAG-11 put it at ~29 hours
-
gingeropolous
model name : AMD Opteron(tm) Processor 6172
-
ArticMine
We must keep in mind that the goalposts are moving as we talk
-
sarang
the best way would be to time it during an actual sync, once you hit the starting block for the range
-
UkoeHB_
My goalposts are the same. Increase ring size without compromising on scaling
-
sarang
but I used op-counts in an attempt to be a bit more consistent with the multiexp-based next-gen numbers
-
gingeropolous
and your running them virtualized, dunno how thats ultimately effecting things
-
sarang
The multiexp numbers were quite consistent
-
gingeropolous
well if thats the goalpost, 29 hours of MLSAG-11 is in the same ballpark as triptych-multi-512
-
sarang
and all next-gen values used the same op count data
-
gingeropolous
u think the whole dataset is in RAM for those runs sarang ?
-
sarang
? that's not how I got the numbers
-
gingeropolous
my bad
-
sarang
The simulator extracts the I/O data and scales the operation-count data accordingly
-
sarang
so the only time that the hardware matters is when doing baseline op-count data
-
ArticMine
-
sarang
it doesn't run the cryptographic operations on the data directly
-
gingeropolous
ah
-
sarang
Florian's talk is starting now @ SBC20
-
sarang
If anyone wants numbers for different hardware, let me know and I'll explain how to get the right baseline numbers
-
sarang
it's not too bad if you know how to build the codebase
-
UkoeHB_
Ahhh subaddress adoption may be a lot higher! Additional pub keys are not added in some cases, which are actually by far the most common cases
-
sarang
I forgot to ask about any particular action items on anyone's list, if they care to share them
-
UkoeHB_
Namely, when one output is to a subaddress, and the other output is change, then no additional keys are added.
-
UkoeHB_
Isthmus would you mind getting supposed subaddress adoption among the subsets of 2-out tx and >2-out tx?
-
UkoeHB_
This week I'll be working on sarang 's tx proof chapter, and then hopefully(tm) start looking at bulletproofs. Bulletproofs is the last to-do for ztm2 before my final proofread, then a public proofreading period of 2-4 weeks, then publishing on getmonero.
-
sarang
neat
-
sarang
Have you decided at what level you want to present bulletproofs?
-
UkoeHB_
I kind of want to do a full run through, but guess we'll see when I get there. To understand it properly I'll end up writing a chapter just for my notes, which can easily be a ztm2 chapter
-
UkoeHB_
In principal a reader of ztm could make their own (insecure but functional) ec curve library from the basic modular arithmetic, so it feels wrong to not also make their own bulletproofs from scratch.
-
sarang
Is there a big advantage to not pointing the reader to the BP paper?
-
sarang
It's quite good in its explanation
-
sarang
There are definitely some aspects worth noting specifically, like 1/8th point offsets and batch weighting
-
sarang
Very short issue posted to discuss tx pubkey uniformity:
monero-project/research-lab #71
-
UkoeHB_
It takes a lot of mental time and energy to reinitialize your brain (or my brain anyway) to a new document. Having bulletproofs as part of the 'conceptual world' of ztm makes it way easier for readers to get started, and then to also relate those concepts to other ztm concepts for a wholistic reading experience.
-
sarang
Is there help I can offer?
-
UkoeHB_
I'll let you know when my brain gets there :)
-
sarang
heh ok
-
sarang
Feel free to use my Python test implementation if that's helpful
-
sarang
Oh, my action items are further work on next-gen protocol code/analysis
-
sarang
Some review on vtnerd's 64-bit operation code
-
sarang
and, if suraeNoether has new material for CLSAG security model, working on that as well
-
sarang
Oh: and I have 2 open PRs that could use review
-
sarang
One is a simple one relating to hash domain separators:
monero-project/monero #6338
-
sarang
The other is an update to transaction in/out proof structure:
monero-project/monero #6329
-
sarang
6329 is still listed WIP, but is ready for review
-
sarang
UkoeHB_: I'll read over the changes for ZtM you listed too, if that's helpful
-
sarang
And will be watching lots of livestreamed talks from Stanford:
cbr.stanford.edu/sbc20
-
» sarang is done now
-
sarang
UkoeHB_: in the multisig chapter, I think it's important to identify which constructions have corresponding security proofs, and which do not... since it appears you're introducing new constructions which are neither part of the codebase nor part of the preprint
-
sarang
Otherwise, it might be tricky for the reader to clearly identify which parts of ZtM document the actual protocol and common implementation(s), and which are ideas you have that do not correspond in this way
-
UkoeHB_
Ok I'll clarify
-
UkoeHB_
The most controversial point that comes to mind is reducing the commit-and-reveal expectations, which may be due to my rather superficial understanding of the problem it solves.
-
suraeNoether
sarang: check out reremain on my overleaf doc "MRL-00XY" to see a version of the CLSAG paper i want your thoughts on
-
sarang
sure
-
suraeNoether
it's... down to 13 pages
-
suraeNoether
proofs and all
-
suraeNoether
i feel like it's "too simple"
-
sarang
oreeeeeeally
-
suraeNoether
buuut
-
suraeNoether
we'll see