-
gingeropolous
i hate reviews like that. they basically want to see the work done, but don't want to do it themselves or pay to have someone do it
-
gingeropolous
its like no buddy, review the work done
-
rehrar
bro
-
rehrar
irccloud
-
rehrar
wat?
-
lena
hey
-
needmoney91
yeah irccloud is kil
-
needmoney91
for like 6 hours now ._.
-
needmoney91
you're the second person I know that used an alternate client lol
-
fluffypony
-
fluffypony
looks like upstream issue
-
xmrmatterbridge
<sarang> Meeting here at 17:00 UTC (about an hour from now)
-
xmrmatterbridge
<sarang> I'll be using this mattermost account since IRCCloud shat the bed
-
xmrmatterbridge
<sarang> (will verify the account is legitimate once IRCCloud comes back online)
-
gingeropolous
.time
-
monerobux
2020-07-08 - 16:00:02
-
the_real_isthmus
Meeting in 20?
-
the_real_isthmus
.time
-
monerobux
2020-07-08 - 16:40:19
-
the_real_isthmus
good bot
-
xmrmatterbridge
<sarang> aye
-
xmrmatterbridge
<sarang> All right, we'll get started with the meeting in just a few minutes
-
xmrmatterbridge
<sarang> The usual agenda:
monero-project/meta #482
-
xmrmatterbridge
<sarang> Note that since IRCCloud is down, some people may be using other accounts... so be aware
-
xmrmatterbridge
<sarang> (e.g. I am using a mattermost account, but will verify its legitimacy once IRCCloud returns)
-
xmrmatterbridge
<sarang> As always, take with a grain of salt anyone claiming an identity from an unusual account
-
xmrmatterbridge
<sarang> OK, time to get started!
-
xmrmatterbridge
<sarang> As usual, GREETINGS first
-
xmrmatterbridge
<sarang> hello
-
ArticMine
Hi
-
xmrmatterbridge
<sgp_> Hi
-
» the_real_isthmus waves
-
xmrmatterbridge
<sarang> We may have lower attendance than usual, since many people use IRCCloud and it's currently down
-
xmrmatterbridge
<sarang> But we can move along to ROUNDTABLE, where anyone is welcome to share research of interest with the group
-
xmrmatterbridge
<sarang> Does anyone wish to go first?
-
the_real_isthmus
I can share a quick update
-
xmrmatterbridge
<sarang> Go ahead, account claiming to be Isthmus!
-
the_real_isthmus
We examined a few mechanisms that were suggested at last week’s meeting. Triptych is not secure against Shor’s algorithm, as expected. Also, Keccak/chacha20 might run into issues with the Bernstein–Vazirani algorithm (hidden linear function problem).
-
the_real_isthmus
We’re starting to turn our attention from problems towards solutions, and we’re working through a lot of recent literature (h/t reading suggestions from surae).
-
the_real_isthmus
I’m amazed at some of the recent improvements. A few years ago, any post-quantum cryptography was laughably unwieldy. TB-scale keys, absurd verification times, etc.
-
the_real_isthmus
Today’s crypto schemes are less painful by a few orders of magnitude. Check out this paper highlighted by surae - MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
-
the_real_isthmus
-
the_real_isthmus
MatRiCT supports ring sizes of around 64, verification time around 25 ms, 4 kB keys, 31 kB signatures. Not stellar, but could be much worse!
-
the_real_isthmus
Anyways, over the next week we’ll dig into some more modern schemes and I’ll report back here about the most relevant prospects.
-
» the_real_isthmus tries to figure out how to hand the mic back to sarang from across a bridge
-
xmrmatterbridge
<sarang> Impressive numbers from that abstract
-
the_real_isthmus
Oh actually, looking at the tables, ring size 64 might be closer to 40 ms verification
-
xmrmatterbridge
<sarang> Not really suitable size-wise, compared to today's signatures, but not bad overall
-
» the_real_isthmus digs around for a link
-
the_real_isthmus
-
xmrmatterbridge
<sarang> thanks
-
the_real_isthmus
Anyways, that's all from me. More info next week, same bat time, same bat channel
-
xmrmatterbridge
<sarang> Great, thanks for the update, possibly-Isthmus :)
-
ArticMine
Still there within a 10 year range of Nielsen's Law of Internet Bandwidth which is a factor of ~57x
-
ArticMine
This is really interesting
-
» the_real_isthmus looks up Nielsen's law
-
the_real_isthmus
-
the_real_isthmus
ooh
-
xmrmatterbridge
<sarang> I wonder how widely those estimates apply
-
xmrmatterbridge
<sarang> e.g. in the United States, network providers charge absurd amounts of money for often terrible service
-
ArticMine
-
xmrmatterbridge
<sarang> So for the average user, "possible" bandwidth is likely not "actual" bandwidth
-
ArticMine
The trend is pretty accurate, from my own experience in Canada
-
the_real_isthmus
Probably the same curve, just with a time lag
-
ArticMine
1.5x a year compounded
-
xmrmatterbridge
<sarang> It may also be dangerous to assume that capabilities for "high-end users" (as the article says) are sufficient for basing protocol decisions on
-
xmrmatterbridge
<sarang> Then you start to run the risk of alienating entire groups of users
-
xmrmatterbridge
<sarang> and centralizing services around high-capacity entities
-
ArticMine
Actually the cost difference between high end and low end is narrowing
-
ArticMine
especially for consumer accounts
-
xmrmatterbridge
<sarang> I can share a few research items now
-
xmrmatterbridge
<sarang> I sent an updated CLSAG security model and linkable anonymity theorem/proof to the reviewers, who said the changes address their concerns
-
xmrmatterbridge
<sarang> We're trying to determine the best way to include these changes in a follow-up report
-
xmrmatterbridge
<sarang> They want to keep the original report mostly untouched, but I also think it's important to make clear what updates were made, and how those updates affect their conclusions
-
xmrmatterbridge
<sarang> After all, that's the point of the review
-
xmrmatterbridge
<sarang> The current IACR version of the preprint contains all the updates so far:
eprint.iacr.org/2019/654
-
xmrmatterbridge
<sarang> Separately from this, PoPETs reviewers for Triptych and Arcturus suggested those preprints may be better suited for workshop submission due to their content and scope
-
xmrmatterbridge
<sarang> One reviewer for Arcturus claimed to have found a way to break the hardness assumption, but their supposed counterexample doesn't work... I don't think they tested it, or perhaps they didn't fully read through all the requirements of the assumption
-
xmrmatterbridge
<sarang> Arcturus is still technically under PoPETs consideration and can't be submitted elsewhere yet, but Triptych can
-
xmrmatterbridge
<sarang> I'm finalizing it for submission to an ESORICS workshop whose deadline is July 10
-
xmrmatterbridge
<sarang> Unfortunately CLSAG is far too long for ESORICS, but could be submitted to PoPETs at their next deadline; however, I fear it will be rejected for being too incremental
-
xmrmatterbridge
<sarang> Scaling it back to the ESORICS limit would basically nix all the security model improvements, and then the reviewers would probably (rightly) complain that such a security model is too weak
-
xmrmatterbridge
<sarang> So I don't think it's possible to win on that front :/
-
xmrmatterbridge
<sarang> Preprint submission is not a fun game
-
xmrmatterbridge
<sarang> Anyway, those are my updates
-
xmrmatterbridge
<sarang> Once again, I wish there were a Journal of Incremental Cryptography =p
-
xmrmatterbridge
<sarang> Does anyone else wish to share anything?
-
moneromooo
Encouragements to whoever "sarang" is for the submission work ^_^
-
xmrmatterbridge
<sarang> heh, thanks :)
-
xmrmatterbridge
<sarang> I wish there were better news on the submission front :/
-
xmrmatterbridge
<sarang> But the gist of the Triptych initial reviews seemed to be "this is an incremental improvement that appears not to have major flaws" and that's something
-
xmrmatterbridge
<sarang> Comments on Arcturus certainly addressed that an untested hardness assumption carries additional risk that may be offset by its benefits
-
xmrmatterbridge
<sarang> and that's a very valid point
-
xmrmatterbridge
<sarang> But at least the supposed counterexample doesn't appear valid (not that this demonstrates it's secure!)
-
xmrmatterbridge
<sarang> Since Arcturus is still under consideration, there's a rebuttal period where I can directly address reviewer comments
-
xmrmatterbridge
<sarang> (for Triptych, there is no such period available)
-
xmrmatterbridge
<sarang> I'll post the counterexample as a paste later, to have someone else verify my conclusion
-
xmrmatterbridge
<sarang> IIRC the rebuttal period ends around July 19 or so
-
xmrmatterbridge
<sarang> OK, if there isn't anything else to share, we can move to ACTION ITEMS for the upcoming week
-
xmrmatterbridge
<sarang> I'll continue to work with the CLSAG reviewers on the preprint side of things; they are still working on the code part of their review (which was delayed)
-
xmrmatterbridge
<sarang> Additionally, I'll finalize the Triptych submission to the ESORICS workshop, and send off some comments/questions for the Arcturus PoPETs rebuttal period
-
xmrmatterbridge
<sarang> If there's time, I'll continue with some output merging analysis using my new analysis toolkit
-
xmrmatterbridge
<sarang> Anyone else?
-
xmrmatterbridge
<sarang> Oh, and there's a lot of lit review that I wish to catch up on
-
xmrmatterbridge
<sarang> Righto, in that case, we can adjourn!
-
xmrmatterbridge
<sarang> Thanks to everyone for attending
-
xmrmatterbridge
<sarang> Can someone post meeting logs to the GitHub agenda issue? I usually do so via IRCCloud, which is not available
-
xmrmatterbridge
<sarang> Or paste them and I can format for GitHub
-
xmrmatterbridge
<sarang> Ah nvm, monerologs.net has an export feature
-
xmrmatterbridge
<sgp_> nice :)
-
xmrmatterbridge
<sarang> Logs posted
-
xmrmatterbridge
<sarang> FYI this is an interesting update to the Lelantus security model:
zcoin.io/papers/lelantusv2.pdf
-
xmrmatterbridge
<sarang> Not sure if I had posted the link earlier
-
xmrmatterbridge
<sarang> This version is not the same as the current IACR archive version
-
sarang
Hooray, it's back
-
sarang
FWIW the xmrmatterbridge user sarang was me
-
derpy_bridge_
<[keybase] kaylasu>: few months ago my retarded ass still thought that sarang and surae was the same someone, anyways good thing u validating ur identity over xmrmatterbridge, always tough to deal with impersonations and whatnot