00:43:31 Due to the recent time change in the United States and elsewhere, tomorrow's research meeting will be at 17:00 UTC instead of 18:00 UTC (an hour earlier if your region did not experience a time change) 14:56:07 Reminder: today's meeting is at 17:00 UTC (not 18:00 UTC), which is about two hours from now 15:28:16 sarang: are all MRL meetings going to be at 17 utc during DST? 15:28:51 I expect so, unless others object 15:32:56 Objection, leading. 15:34:28 moneromooo: I updated my PR to your branch with an updated performance test 15:34:50 It fails the github CI tests, but it was forked from an older master 15:37:03 OK, I shall merge today. Thanks. 15:41:03 So the workhorse is completely rewritten then ? 15:41:30 Oh, maybe just moved... 15:56:07 ? 15:56:25 The PR has two commits on top of your earlier work 15:57:07 The big overall picture is to move verification into a single routine, rather than one routine to prepare the commitment differences and another to do the CLSAG-specific stuff 16:21:38 The tests are updated since now it doesn't make sense just to test the CLSAG routines, since they're closely tied to the prove/verify higher-level routines 16:54:09 Meeting will start in about 5 minutes or so 16:59:44 OK, let's begin the meeting! 16:59:56 Agenda is here: https://github.com/monero-project/meta/issues/445 17:00:03 Logs will be posted there after the meeting 17:00:09 good morning 17:00:12 First on the list, GREETINGS 17:00:13 hi 17:00:59 * selsta lurking for CLSAG updates 17:01:03 Note that because of a recent time change for the United States and elsewhere, these meetings will take place at 17:00 UTC instead of 18:00 UTC 17:01:12 hi 17:01:21 * sarang will wait a few moments for folks to arrive 17:02:05 heya sarang and artic 17:02:12 * Isthmus puts on lab coat and goggles 17:02:53 I suppose we can move on to ROUNDTABLE 17:02:58 Who wishes to share research topics of interest? 17:03:15 hi 17:03:37 Hi 17:03:43 well 17:03:55 i want to give a brief two-part update 17:03:58 Go ahead suraeNoether! 17:05:15 firstly, personally: i'm going to have to take a break from monero for a few weeks while i get this medical stuff figured out. importantly: i'm not stopping work. I just don't know how much time i can actually contribute practically. 17:05:57 Oof, sorry to hear this. I hope everything goes well for you suraeNoether 17:06:46 sorry to hear this. I hope all goes well 17:07:29 secondly: my research into matching is a hydra where fixing one bug is revealing handfuls of more bugs, and i'm getting super frustrated with it. this is particularly important work for a few reasons, but for right now i don't anticipate movement any time soon. one of the reasons that this has become so frustrating to me is that certain threats to monero that are going to become more likely over the 17:07:29 next several years to be presenting themselves that make the answers that lie within this work *lower priority* than other things. i mean this very specifically in the following sense 17:08:18 everyone should know that our anonymity reduces to something like the one-more decisional diffie hellman problem, and our unforgeability reduces to something like one-more discrete logarithm 17:08:44 both of these are known to not be hard for quantum adversaries, and while quantum computers are not yet practical... 17:09:25 it doesn't matter what ring size we use if china goes "manhattan project" on quantum computers and turns their resulting computing power on de-anonymizing privacy coins in secret. 17:10:07 my work on matching would give us answers to questions like "how large should ring sizes be *assuming the underlying problem that our anonymity rests upon is hard to solve*" but we know that this problem is only going to be hard over the short term 17:10:12 FWIW such a "quantum adversary" could wreak havoc on basically the entire global internet 17:10:32 indeed ^ but that's in fact exactly all the more reason to become resistant to a quantum adversary sooner rather than later 17:10:56 How realistic is a quantum adversary? 17:10:57 ^ I agree 17:11:04 if it takes 3 years to migrate to a quantum-secure system, and we hope something like clsag or triptych has a 3 year shelf life, then we should be looking at what will be practical 6 years from now 17:11:15 In the shorter term, understanding the effects of ring size on matching-type analysis is useful for knowing how large to make ring size for a next-gen protocol 17:11:22 Uhm 17:11:43 Would an adversary with a quantum computer break ring signatures or just decrypt the transactions? 17:12:01 both: they can compute the discrete log of every one-time key and then they just own all of monero 17:12:10 Yeah, I'd just do that. 17:12:15 yeah 17:12:17 so like 17:12:25 Once you have key discrete logs, you can check key images 17:12:31 matching: important. investigating quantum-secure schemes: higher priority, even over a relatively short 3-year term 17:12:54 so every time i kill a bug in my matching code, i become more painfully aware: i'm fighting the wrong hydra 17:13:20 I still think it's very valuable 17:13:20 Yeah, we've been doing some quantum vs crypto experiments at Insight lately 17:13:24 long story short, i'm prsently working on a summary-of-knowledge of quantum-resistant RingCT-type protocols, 3 of which have been proposed in the past 3 years 17:13:29 Otherwise, "bigger rings are better" is a qualitative statement 17:13:38 just for community education reasons 17:13:41 sarang: absolutely agreed 17:14:14 My recent work on Triptych-2 and chain simulations shows, as expected, that ring size has a large effect on verification complexity 17:14:22 Can you also evaluate how realistic a quantum adversary is? I recall general skepticism of them ever materializing 17:14:36 So choosing the smallest rings that do the job is important 17:14:53 UkoeHB_: yeah, so basically here's a qualitative answer to that question 17:15:08 We're already working on 5 [actual] qbits 17:15:21 (Insight working on IBM equipment) 17:15:30 Expecting this to scale in the next few years 17:15:31 you may recall the sensationalist headlines a few months ago: https://www.eurekalert.org/pub_releases/2020-02/aps-teo022720.php 17:15:42 quantum supremacy is probably a bad term but 17:15:59 before these researchers did what they did, the *fastest way to figure out what a quantum computer can do* would be to *simulate it on a classical computer* 17:16:15 Quantum supremacy is a poor metric for usefulness IMO 17:16:25 Such problems are typically highly contrived 17:16:29 because of these guys' work, that is no longer the case: there now exist quantum computers that cannot be simulated more quickly than they can operate. this is a critical benchmark for scaling quantum 17:16:33 @surae should I just loop in my quantum/crypto engineer for a few weeks, so you can focus on the matching hydra? 17:16:50 They're already looking into the schemes, and would probably be happy to work on Monero 17:17:34 google's bristlecone has 72 qubits running 17:17:44 isthmus: let's set up a call for later this week 17:17:55 well I have to say it ... quantum computers are BS, they just spin hyperbole but go nowhere. There was a discussion about this on metzdowd 17:18:38 Given retroactive denonymization doesn't really matter if they're 5 or 15 years off, we gotta hustle to protect Monero users in 2020 17:18:49 do you mean like computers based on quantum principles will never work, vtnerd? can you clarify? 17:18:59 isthmus ^ bingo 17:19:21 someone discussed the progress made on metzdowd. Its been very little over 25+ years 17:19:46 the researchers have alwasy been just on the edge of making it a reality 17:20:39 okay well 17:20:50 the researchers into QC i've spoken with disagree 17:20:55 and that's an appeal to authority 17:21:09 admitedly this isn't my expertise, but theres time tradeoffs investigating these QC resitistent systems 17:21:55 but i think it's absolutely silly to say that very little progress has occurred over 25 years, and it's even sillier to assume that no progress will be made ala cold fusion, and i think it's even sillier to propose that we, say, avoid quantum-secure implementations rather than looking into the costs and benefits and time horizons of implementing them 17:22:28 and the one thing thats bizarre, is when someone builds a QC system, we basically ahve to reboot on general purpose computing projects, no? Like one year out are they even cracking crypto? 17:23:05 well, i don't want to take more time on this: my update is that i have to step back from monero for awhile, and i'm looking into RLWE-based ring signatures 17:23:14 Y'all know the tech cycle. Many-year winters leads to the most exciting explosions. AI, crypto, quantum... the pattern repeats 17:23:18 i'll still be presenting at meetings and coming by and stuff 17:24:11 for folks who are interested, the wikipedia article on the timeline of quantum computing has lots of good info 17:24:58 OK thanks suraeNoether 17:25:02 I have a few things to share 17:25:05 First, CLSAG 17:25:15 I've completed review of suraeNoether's security model updates 17:25:23 suraeNoether: I've left several Overleaf review comments for you 17:26:09 Along with that, I migrated some recent CLSAG verification optimization code to moneromooo's branch, along with relevant unit and performance tests 17:26:20 Saves about 5% on verification, which seemed worth it 17:27:09 Relating to Triptych: I made a minor update to the original Triptych-1 preprint for readability, but also completed the Triptych-2 preprint 17:27:29 Here is a link to the Triptych-2 preprint on Overleaf: https://www.overleaf.com/read/ynfkhykjfvrd 17:27:53 I'd appreciate any review on it prior to posting to the IACR archive 17:28:27 Unrelated to these, I've been catching up with literature review 17:28:46 and, as a program committee member for the IEEE S&B conference, I'm reviewing submissions 17:28:52 i'll take a look at your comments and read through triptych 2: electric bugaloo 17:29:00 Thanks suraeNoether 17:29:05 IMO the CLSAG review is top priority 17:29:15 Did you contact Teserakt? 17:29:38 I'd like to wait on confirming a schedule until we have this paper done 17:29:53 Otherwise we risk losing the availability again due to delays 17:30:48 Anyone who wants to review the CLSAG optimizations can see this branch: https://github.com/SarangNoether/monero/commits/clsag-mooo 17:31:34 Finally, my funding proposal needs feedback on GitLab before it's decided whether to open it: https://repo.getmonero.org/monero-project/ccs-proposals/-/merge_requests/131 17:31:39 That's all for me today 17:31:47 Does anyone else wish to present, or have questions? 17:34:24 i propose that we fund sarang 17:34:33 but no 17:34:36 no questions 17:34:48 I propose that we fund surae 17:34:49 Heh, then leave a reaction or comment on gitlab! 17:34:54 I've been wrestling with a weird conundrum 17:35:27 Go on 17:35:28 I'm thinking about modifying my wallet to only select decoys from transactions generated by the core wallet 17:35:47 But then that in and of itself becomes a subtle heuristic 17:35:49 Ah, so using fingerprinting to pick the most "standard" decoys? 17:36:05 Not "most" 17:36:12 Something either looks like the core wallet, or provably isn't 17:36:14 Heh, yeah, it kicks the fingerprinting can slightly down the road 17:36:56 I guess if almost everybody used only outputs generated by the core wallet, then it wouldn't be a heuristic to fingerprint me 17:37:16 *outputs that cannot be proven to have not originated from the core wallet 17:37:18 ^ to be very specific 17:37:36 got it 17:38:05 Eh, I dunno. Don't really have a solution. It was just funny that I worked on it for a it before realizing that it becomes its own heuristic xD 17:38:25 Anyways, nothing much from me. I've had about 20 minutes per week for Monero lately 17:38:37 But in May, we're gonna have some long talks and clean house 17:39:04 ? 17:40:02 Have 7 heuristics that have now partitioned out upwards of 20 different implementations. 17:40:11 Most of which I've shared in MRL already 17:40:22 20 sounds like a lot 17:40:29 monero is really doing well if there are 20 17:40:38 That's unfiltered for time. 17:40:49 Going to clean it to recent blocks and see what's in the wild *now* 17:41:02 So some might be updates to the same implementations? 17:41:02 It's at least 3 right now, 17:41:36 Yeah, that's why I'm not really sweating the 20 17:41:52 I think it's 3-5 in current era 17:42:19 Which is pleasantly(?) surprising 17:43:05 But yea, with absolutely no time to work on it now, hard to put together a full writeup 17:43:15 But will definitely circle back in the next 2 months 17:44:01 Sounds good! 17:44:07 Anyone else wish to share any research? 17:44:50 hi, ztm2 proofreading draft is updated (with feedback from sarang about bulletproofs, and also the clawback formula regarding tx weights) https://www.pdf-archive.com/2020/03/11/zerotomoneromaster-v1-1-1/zerotomoneromaster-v1-1-1.pdf 17:45:02 2 more weeks for proofreading 17:46:25 Good feedback so far overall? 17:46:27 also, looked into next-gen tx key image generation for multisig (sarang has a solution for it), and it seems like inversion key images wont greatly disrupt multisig transaction flows (especially escrowed markets, which is a big deal) 17:46:32 Not much feedback so far 17:47:41 But it's 152 pages so not surprising 17:48:24 that's all from me 17:48:38 OK, let's move on to ACTION ITEMS for the next week or so 17:48:51 I'll await final word on my CLSAG review notes 17:48:54 wondering if ArticMine has progress on fees 17:49:15 Continue working on Triptych 17:49:57 Why did it switch from 02 to 20? 17:50:00 oops 17:50:02 Yes I do 17:50:03 ignore that 17:50:51 Go ahead ArticMine! 17:51:13 I am looking at making the penalty free one also dynamic and using the long term median to control it 17:52:14 Also slowing down the fall in the long term median to match the constraint on the rise 17:52:58 just got caught up 17:53:10 So it does not go from say 3000000 bytes 300000 bytes in one shot 17:54:17 The new dynamic penalty free one would track the long term median at say 20 - 25% of the long term median 17:55:01 Ooh interesting 17:55:20 This will provide predictable fee over time 17:56:34 Will you have a specific proposal for this, intended for a network upgrade? 17:56:50 The models I am looking at is a sharp drop, followed by a fiat banking crisis that creates a very sharp rise 17:56:52 Yes 17:57:27 OK, any final thoughts or topics before we wrap up this hour? 17:58:06 be kind to each other 17:58:10 just be excellent 17:58:12 you animals 17:59:19 All right, thanks to everyone for attending. Adjourned! 18:00:06 suraeNoether: you still here? 18:01:03 I know you're not especially interested in matching compared to the newer stuff, but it needs to be done for the safety of Monero users 18:01:03 Yep 18:01:17 It's not a matter of lack of interest 18:01:32 Matching will make a huge influence on how Monero changes its protocol the next few months to years 18:01:51 Yes, it will. 18:02:18 You've also been working on this project since what, the beginning of 2018? Almost 2 years? 18:02:28 (not exclusively of course) 18:02:39 Yes. 18:03:05 I really think it's time to figure out a way to get some insights out of this project 18:03:17 Even if they're limited in some way 18:07:36 Well, I certainly can't disagree with that 18:09:34 Deciding ring size for the next gen transaction protocol might be difficult without an analysis backing it up, since verification times are linear. 18:09:48 So what would that potentially look like? The MVP based on what you currently have 18:10:16 UkoeHB_: exactly, we can use common sense, but we should be using more than just that 18:18:05 suraeNoether ^ 18:18:20 I am thinking about it 18:23:17 So, for one thing, I have non-elective surgeries coming up, so in a practical sense the question is 'what would be required to hand the project off to someone else to finish' 18:25:00 And in that regard, I have made my code available this entire time, and my latest commit appears to be passing unit tests. My simulator writes a ledger to file in a human readable format. There, in theory, has been nothing stopping anyone from picking it up in the first place. I can expand upon my notes in my md files so that in principle a new person could pick it up to finish it 18:25:54 Looking back on it with atoc, who offered to help, I should have taken him up on that offer, but the funding issues around it were a little thorny for me 18:28:35 There are a couple of more things I can try for debugging, but it would take days or weeks to get another person up to speed on that project 18:30:16 The annoying part is that the gap between MWP and full working product is zero: if the code starts working, it just spits out a complete and total analysis into a csv file anyone can open 18:30:29 If there's funding for it, I have several few researchers with graph theory and python background that could run with it for a quarter 18:30:39 A fresh set of eyes might be nonlinearly productive too 18:30:39 Which is why I had to think about your question sgp_ 18:31:03 Oh yes, if you have postdocs with those skillsets, let's arrange a call for later today 18:33:08 👍 18:34:33 where is this code? 18:36:00 https://github.com/b-g-goodell/mrl-skunkworks 18:36:09 Matching mojojo branch 18:36:17 Under the folder Matching 18:36:45 https://github.com/b-g-goodell/mrl-skunkworks/blob/matching-mojojo/Matching/graphtheory.py graphtheory has been passing tests for ages 18:37:11 My simulator, which generates a monero ledger together with a ground truth, is super fragile 20:44:47 long story short, i'm prsently working on a summary-of-knowledge of quantum-resistant RingCT-type protocols, 3 of which have been proposed in the past 3 years <<< nice