-
sarang
New preprint that, like Triptych-2, uses an extension to Groth proofs (but in a different way and for a different application):
eprint.iacr.org/2020/293
-
sarang
Crazy timing!
-
midipoet
what is the status of Zether, do you know?
-
sarang
I do not know
-
moneromooo
sarang: was there any known problem with multi sender txes, apart from the privacy leak to other senders in the same tx ?
-
sarang
Under what transaction model?
-
moneromooo
(and the fact it might not adapt to lelantus/triptych/etc)
-
moneromooo
I'm asking with the current MLSAG system.
-
sarang
Do you mean back when we discussed MoJoin and similar ideas with MLSAG?
-
sarang
Ah
-
sarang
In the dealer-free version, an observer could determine the input/output mappings
-
moneromooo
Yes.
-
sarang
In the dealer version, there was the information leak to the dealer (and partial leak to other senders, since you know which inputs/outputs are not yours)
-
sarang
The idea that koe had removes this by adding additional communication requirements and data offsets
-
moneromooo
Oh, I missed that...
-
sarang
-
moneromooo
ty
-
sarang
^ proofreading draft
-
sarang
Any of the ideas would require some retooling of the bulletproof generation workflow
-
sarang
in addition to the signature stuff
-
UkoeHB_
Which next gen protocols would be capable of joint tx?
-
needmonero90
Have you checked potcoin
-
needmonero90
Sorry I couldn't help myself, carry on
-
» Inge- hands needmonero90 some kettlecoin
-
needmonero90
I heard potcoin was doing research and development into joint txes
-
» needmonero90 takes the kettlecoin
-
» UkoeHB_ feels bad
-
sarang
UkoeHB_: RCT3, Lelantus, Triptych have linear dependence on signing keys (outside of key images, which are nonlinear)
-
sarang
and therefore could be used in this way
-
sarang
It isn't clear what would be affected by Triptych-2, which takes a different approach to multi-index signing
-
sarang
I suspect it's possible to do multi-signer while keeping indices private in Triptcyh-2, but don't have a protocol for it yet
-
sarang
Oh, you also mean non-multisig joint signing, between unrelated parties
-
sarang
Triptych-1 definitely works for that as well, since it uses separate proofs per index
-
moneromooo
"I suspect it's possible to do multi-signer while keeping indices private in Triptcyh-2" <- oooooh, that sounds very interesting...
-
moneromooo
er... is multi-signer multisig (everyone signs all inputs) or multi sender (everyone signs their onw inputs) ?
-
sarang
Yeah, I had specifically examined multisig in the context of single keys produced collaboratively (multisig) for Triptych-2, but less about jointly-constructed txs
-
sarang
It would be a good addition to the preprint
-
sarang
The secret indices come into play with some particular commitments and polynomial coefficients, the signing keys are used in a linear combination with offsets that could probably be done safely between parties, and the output commitments appear similarly
-
sarang
Sounds like a fun problem :D
-
sarang
Interesting new preprint:
eprint.iacr.org/2020/289
-
sarang
There had been some early interest in Jacobians of hyperelliptic curves for unknown-order constructions, but this calls the practical security and efficiency into question
-
sarang
RSA and class groups are other options, but either lack good size efficiency or require trusted group parameter setup
-
ArticMine
The idea behind the 00% was to keep some incentive for the the use of more than 2 output txs (smaller size) while pricing as much as possible the linear with number of outputs verification time
-
sarang
ArticMine: remind me, was the specific 80% value arbitrary?
-
sarang
(I haven't reviewed my logs for the conversation on this)
-
sarang
I don't recall there being a deterministic reason for 80% exactly
-
ArticMine
It was arbitrary
-
sarang
ok, thanks
-
sarang
^ UkoeHB_
-
ArticMine
It comes down to relative weight one gives to verification vs size
-
sarang
yep
-
sarang
UkoeHB_ had asked earlier about the specific value
-
sarang
I didn't recall if it was arbitrary or not
-
ArticMine
One in principle could make it deterministic if one cold measure the relative impact on the network of a size attack vs a verification attack
-
UkoeHB_
80% seems ok as a ballpark of a more deterministic estimate
-
UkoeHB_
The world of safety factors is a lot of intuition lol