-
binaryFate
ok interesting
-
bmo-noire
~~
-
sarang
Hello all
-
sarang
Reminder that the usual weekly meeting will take place here at 17:00 UTC
-
sarang
(it's currently 15:20 UTC)
-
sarang
.time
-
sarang
Rats, that bot does not live here
-
timebot
Hello sarang, the time is 1556 h UTC
-
derpy_bridge
[keybase] <seddd>: :) more bot friends
-
Isthmus
Hiya
-
Isthmus
I wanna join for the meeting, but I'm soooo sleepy
-
» Isthmus pulls on lab coat, then takes a nap
-
sarang
OK, let's get started with the meeting
-
sarang
GREETINGS
-
sarang
hi
-
derpy_bridge
[keybase] <seddd>: o/
-
UkoeHB_
hi
-
» sarang waits a few moments for others to arrive
-
SerHack
hi
-
sarang
Moving on, then, to ROUNDTABLE
-
sarang
Who wishes to share research of interest?
-
ArticMine
Hi
-
sarang
I can share a few things
-
sarang
I've completed some formal peer review for the IEEE S&B proceedings
-
sarang
and worked on analysis for a linkable ring signature construction in IACR 2020/333
-
sarang
it claimed to be more efficient than CLSAG
-
sarang
However, the numbers assumed an insecure key image construction
-
sarang
The authors have already posted a revision, but it doesn't include numbers or new security proofs for the modified construction
-
sarang
Besides this, here's an update on some other projects...
-
sarang
For CLSAG, I am still waiting on the final go-ahead from suraeNoether, who is a coauthor on the paper
-
sarang
I finished code optimization and made a PR to moneromooo's branch, which has some nice verification speedups
-
sarang
For Triptych-1, its preprint has been updated at IACR 2020/018
-
sarang
An MPC construction for key images is completed, and multisig/join analysis is still underway
-
sarang
For Triptych-2, its preprint has been posted at IACR 2020/312
-
sarang
Multisig/join analysis is still underway
-
sarang
That's all for me
-
sarang
Any particular questions or comments?
-
nioc
how much verification speeedup for CLSAG?
-
derpy_bridge
[keybase] <seddd>: Do you need any more eyes on the CLSAG PR?
-
sarang
It's around 4-5%
-
nioc
nice
-
sarang
seddd: That would be welcome, once moneromooo integrates the new changes into the branch
-
derpy_bridge
[keybase] <seddd>: Ok, let me know, and I'll review
-
sarang
that'd be great
-
moneromooo
I did, I can push.
-
sarang
Oh excellent
-
ArticMine
4-5% reduction in size? Verification time?
-
sarang
The only real changes from the paper's description is a modification to the public parameters that go into the challenge hashes, which allows for the speedup to happen
-
sarang
ArticMine: verification time
-
sarang
I didn't bother with generation stuff, since that's less important
-
sarang
Size is identical
-
sarang
The PR includes new performance tests with better direct comparison to MLSAG, if that's useful to anyone
-
derpy_bridge
[keybase] <seddd>: moneromooo: link?
-
ArticMine
So is this the version that is going for audit?
-
moneromooo
Not yet.
-
sarang
Presumably, but that's up to the audit workgroup
-
moneromooo
I'm rebasing it to master now, then will run tests, then push, then post a link.
-
sarang
moneromooo: excellent, then the CI workflow will operate properly
-
derpy_bridge
[keybase] <seddd>: awesome, many thanks π€
-
sarang
Any other questions for me?
-
sarang
Or does anyone else wish to share research topics?
-
derpy_bridge
[keybase] <seddd>: Mb but it involves pow of another coin, not sure appropriate
-
sarang
Perhaps suited for after the meeting
-
derpy_bridge
[keybase] <seddd>: Definitely
-
selsta
who is the audit workgroup? sgp?
-
sarang
sgp_ has been working to coordinate
-
sarang
As far as the CLSAG paper goes, if I don't hear from suraeNoether, eventually I suppose we'll just have to release the revised version without him
-
sarang
But I would prefer not to do that, since he's a coauthor
-
derpy_bridge
[keybase] <seddd>: Is suraeNoether not around rn?
-
sarang
He hasn't enabled public viewing on the overleaf version, and I don't have access rights to do that unfortunately
-
sarang
No, he is not around right now AFAIK
-
derpy_bridge
[keybase] <seddd>: k
-
sarang
Well, to respect everyone's time, I suppose we can move to ACTION ITEMS
-
UkoeHB_
update from me: proofreading is extended to this weekend as comments are trickling in at the last moment :p; I have received several good feedbacks so far
-
sarang
Ah ok, go ahead UkoeHB_
-
UkoeHB_
-
UkoeHB_
that's all
-
sarang
Great, thanks
-
sarang
My action items are to complete my proofreading of Zero to Monero (it's been delayed; my apologies)
-
sarang
and to work on some Triptych-2 MPC math
-
sarang
Anyone else?
-
hyc
"research only, not for production use" inb4 sumo releases it and claims to be first
-
UkoeHB_
oh right, I made a small update to Janus mitigation
-
sarang
hyc: ?
-
sgp_
UkoeHB_: cool,, what?
-
derpy_bridge
[keybase] <seddd>: lul hyc
-
hyc
sorry, catching up from a couple days ago
-
UkoeHB_
-
derpy_bridge
[keybase] <seddd>: imagines sumo as yt commenter: "FIRST"
-
sgp_
UkoeHB_: none of that is implemented correct?
-
sarang
Off topic, folks!
-
UkoeHB_
correct
-
derpy_bridge
[keybase] <seddd>: srry
-
sarang
IIRC, the last time Janus mitigations were discussed in a dev meeting, there seemed to be mixed support
-
UkoeHB_
my action item is to go through all proofreading comments, and then this weekend finalize a for-publication version
-
UkoeHB_
sarang part of that seemed to be related to exactly how many pub keys and janus base keys it would require
-
UkoeHB_
full Janus mitigation would require: 1 Janus base key per transaction, #pub keys = #outputs for ALL transactions (not just tx with subaddresses as is the case now)
-
sarang
yep
-
derpy_bridge
[keybase] <seddd>: sounds like a lot of overhead, is that one of the main objections?
-
UkoeHB_
there is partial Janus mitigation, where normal addresses and subaddresses are split up; in other words, don't mitigate linking of normal addresses with subaddresses; that way only tx with subaddresses would need the janus base key
-
UkoeHB_
however, even with partial mitigation a lot more subaddress tx would be revealed as subaddress, as there are currently some optimizations that hide subaddress tx among normal tx
-
UkoeHB_
while with full migitation, normal address tx and subaddress tx would be universally indistinguishable
-
UkoeHB_
which iirc sarang was in favor of even outside of Janus
-
derpy_bridge
[keybase] <seddd>: +1 for the latter
-
sarang
Yeah, encouraging/enforcing indistinguishability is useful
-
UkoeHB_
the main objective is solving the Janus attack
-
UkoeHB_
which is currently undetectable
-
sarang
yes
-
derpy_bridge
[keybase] <seddd>: so what are the opposing arguments?
-
sarang
Transaction size is increased
-
sarang
that's a big counterargument
-
sarang
(literally)
-
derpy_bridge
[keybase] <seddd>: :)
-
sarang
So as happens always, there's a tradeoff on complexity (in this case, size and protocol changes) and indistinguishability
-
sarang
s/always/often
-
sarang
Worth noting that with CLSAG, standard tx size already drops from ~2.5 kB to ~1.9 kB
-
sarang
so there's some wiggle room
-
derpy_bridge
[keybase] <seddd>: are there potentially more compact full Janis mitigations?
-
sarang
Each added scalar/group element adds 32 bytes
-
derpy_bridge
[keybase] <seddd>: Janus*
-
UkoeHB_
this is the smallest known mitigation
-
ArticMine
Tx size is increased by how much?
-
UkoeHB_
on average, about 2.2*32 bytes per transaction
-
UkoeHB_
assuming 2.2 is the average output count
-
UkoeHB_
wait no, 32 + 1.2*32
-
UkoeHB_
same thing lol
-
derpy_bridge
[keybase] <seddd>: What about encoding the extra basepoint in smth like a lookup table, where base points are indexed by the first 8? bytes
-
UkoeHB_
actually a tiny bit less than that, taking into account current subaddress tx
-
ArticMine
So 64 bytes for a typical tx
-
UkoeHB_
yeah basically
-
ArticMine
So if the security issue is verified I do not see an issue here
-
UkoeHB_
seddd, the base key must be generated by transaction authors
-
UkoeHB_
under the current construction, not sure if there are any other ways to do it
-
sarang
ArticMine: the math checks out on the fix
-
derpy_bridge
[keybase] <seddd>: Ok so unknowable ahead, gotcha
-
derpy_bridge
[keybase] <seddd>: will read more in the issue you linked
-
sarang
Probably time to bring it up in dev meeting again
-
UkoeHB_
seddd there might be something to that (using a fixed janus base key of some kind), Ill ponder it a bit
-
sarang
Any other action items to bring up?
-
derpy_bridge
[keybase] <seddd>: UkoeHB_ that's kind of what I was thinking, or a fixed set of usable bases
-
derpy_bridge
[keybase] <seddd>: Happy to collaborate, this is an interesting problem
-
sarang
for sure
-
sarang
OK, let's go ahead and wrap things up for this meeting; discussions can of course continue after we adjourn
-
sarang
Any last topics of general interest for the meeting?
-
sarang
Righto! Meeting adjourned
-
sarang
thanks to everyone for attending
-
derpy_bridge
[keybase] <seddd>: ty for the meeting π
-
sarang
Logs will be posted to the github issue shortly
-
sarang
Feel free to continue discussions!
-
derpy_bridge
[keybase] <seddd>: hyc: if you're still around, and have time, I'd like to talk some randomx stuffs
-
moneromooo
I pushed sarang's new CLSAG stuff to
github.com/moneromooo-monero/tree/clsag but tests haven't been run yet, still building.
-
derpy_bridge
[keybase] <seddd>: woot, will pull down and run locally
-
sarang
Thanks moneromooo !
-
selsta
-
selsta
or wait, Windows is just Github being dumb :) macOS does seem to have a problem though
-
moneromooo
Any error message ?
-
moneromooo
(apart from "We are currently unable to download the log. Please try again later")
-
selsta
-
selsta
also Windows CI fails because it seems like you have too many branches lol
-
moneromooo
Does adding a u suffix to 1 help ?
-
moneromooo
Or does that get auto run if I push to the branch
-
selsta
yes it runs again once you push
-
moneromooo
I'll try that then.
-
moneromooo
Same for the rpc tests then, that's where you got that error ?
-
selsta
yep, your rpc patch did not solve the iise
-
selsta
issue*
-
moneromooo
Guess it uses some really weird system to load logs. I've got javascript enabled on that browser but it can't load any log...
-
selsta
hmm afaik it does not javascript
-
selsta
does clicking on β¦ and then View raw logs work?
-
moneromooo
Oh nice, it does , thanks.
-
moneromooo
selsta: AFAICT this change fixed it, so I'll squash and push again.
-
sarang
what was the problem?
-
moneromooo
signed/unsigned thingie.
-
sarang
moneromooo: are you testing locally still? Last commit that I see on your `bitmonero/clsag` branch shows CI failure
-
moneromooo
No. I see it's built on mac. Still going on ubuntu, but it succeeded ealrier.
-
sarang
Ah I see, ok
-
sarang
Best to wait on any mac build fixes before reviewing?
-
moneromooo
And window is being windows apparently.
-
moneromooo
Since Mac builds, no.
-
sarang
Hmm, wonder what the windows issue is
-
sarang
My earlier rebased versions of clsag (without your full implementation stuff) built fine on all platforms
-
moneromooo
selsta said too many branches. Could be out of fds.
-
sarang
but those were only signature stuff and tests
-
sarang
ah ok
-
moneromooo
The error was in seralization.
-
sarang
ty
-
sarang
Is the plan to do a PR to `monero/master` with review there?
-
moneromooo
Yes.
-
sarang
roger
-
sarang
Hope my optimization changes weren't too annoying :/
-
moneromooo
They were not, despite stuff moving around.
-
sarang
gotta keep you on your toes
-
sarang
Looking forward to reviewing the PR :D
-
moneromooo
Well I was waiting for a review first. All this time...
-
sarang
I see
-
sarang
I had expected to review again after any final rebase etc.
-
sarang
to ensure that all the changes I expected were present
-
sarang
since there's been back-and-forth on the optimizations
-
moneromooo
There might be a misunderstanding. What's in the clsag tree *is* the latest including your recent changes.
-
sarang
IIRC you had requested that I not rebase for my changes, to make your integrations simpler
-
» moneromooo ask for a bit
-
sarang
At any rate, apologies for any confusion
-
derpy_bridge
[keybase] <seddd>: moneromooo: running tests on clsag tree now. Is there anything useful you would like me to do manually?
-
sarang
ditto, also testing
-
derpy_bridge
[keybase] <seddd>: also NVM about the set of bases thing for janus mitigation. Just read thru the gh issue again and realized only one extra element need to be sent since fixed base used
-
moneromooo
Well, I can PR it before review if that's what most people want.
-
moneromooo
seddd: depending on your skills and time... code review of various bits. sarang's commits if you're a crypto person, my commits if you're more of a generalist coder.
-
moneromooo
Nothing particular otherwise.
-
derpy_bridge
[keybase] <seddd>: For sure, will dig through the code. I saw fuzz tests when I built, do you welcome contributions there for this PR?
-
derpy_bridge
[keybase] <seddd>: All tests passed btw π
-
derpy_bridge
[keybase] <seddd>: _hurray I iz CI_
-
moneromooo
Feel free to add fuzz tests for anything, though I fear nobody runs them atm.
-
moneromooo
So that makes them not super useful unfortunately.