-
asieamxofn
All you are 'fighting' for is e-penis of a guy you never met, that doesn't even have common decency to pay you for your time.
-
asieamxofn
Do you think they care about Monero, or privacy or anything other than money?
-
fwsrmenjvhqd
I think everyone here knows that most Monero exchange withdrawals and desposits are traceable (Breaking Monero - poisoned outputs). How does it feel to go out and lie to people that they are private and then earn less than holding BTC on your bag?
-
madhatter369
Hey, I've got a quick question regarding Triptych and was hoping anyone on here could help me out with it:
-
madhatter369
In the protocol for parallel linkable one-of-many commitments (section 6) it uses the challenges $\mu_1, ..., \mu_{d-1}$ obtained from a hash / random oracle (obviously these challenges could alternatively be provided by the verifier instead).
-
madhatter369
Now my question is: what's the reason for each $\mu_\alpha$ being a separate challenge? Wouldn't it also work, if the verifier / random oracle only provides a single challenge $\mu$ and then using powers of this challenge, so $\mu_\alpha = \mu^\alpha$?
-
UkoeHB
try emailing one of the paper's authors
-
kenshamir[m]
<madhatter369 "Now my question is: what's the r"> IIUC I think this is what happens in practice, since a field multiplication should be cheaper than squeezing out another challenge from a hash function
-
kenshamir[m]
However in theory/paper, it’s more about proving the protocol secure, which you use a random oracle for and concrete efficiency is not that important
-
sarang
Powers of a single verifier challenge should work fine as well
-
madhatter369
ok great, thanks :)
-
sarang
Note that this is just my intuition at this point; there would need to be a more careful analysis
-
sgp_[m]2
-
sgp_[m]2
did we discuss MProve back in 2018?
-
sgp_[m]2
this doesn't ring a bell
-
sgp_[m]2
-
idtopelbhh
“I thought, ‘I’m going to pump it and dump it,’ because I was interested and taking the ideas and implementing them in bitcoin. The bitcoin code base was far more interesting to me than monero, and I thought, ‘I’m not going to work on this codebase, it’s terrible,'” he recalls - fluffypony in an interview about Monero
-
gingeropolous
how does cut through work?
-
gingeropolous
hrm nvm, reading it. not what i expected
-
gingeropolous
could u hash all the algorithmic inputs for triptych and then just do the verification required on those hashes?
-
gingeropolous
though i guess even if that worked you'd still have to hash 64 or 128 or 256 things and then do the main math
-
gingeropolous
hrmmm... i think im blending homomorphic encryption and hash functions maybe
-
sarang
Triptych relies heavily on the algebraic structure of inputs
-
sarang
Both the signing keys and the amount commitments
-
sgp_[m]2
sarang: are these verification or signing times at the bottom?
github.com/SarangNoether/skunkworks/blob/sublinear/triptych.md
-
sarang
Verification
-
sarang
I don't think I ever bothered with recording signing times, since they're one-off operations
-
sgp_[m]2
okay good
-
-
sgp_[m]2
are they comparable to these from the clsag paper?
-
sarang
No
-
sarang
CLSAG preprint is only the ring signature
-
sarang
That Triptych note includes range proofs, balance proofs, and signing zkp
-
sgp_[m]2
oh so triptych is even better than how it appears comparing directly
-
sarang
The newer CLSAG performance tests include the balance proof, IIRC
-
sarang
So you'd just have to add in the corresponding batched range proof verifications
-
sarang
I tried to unify the perf_tests as much as reasonable
-
sgp_[m]2
but I can pretty safely say triptych 128 is faster to verify than clsag 16?
-
sgp_[m]2
unless those CLSAG numbers are unbatched
-
sarang
The CLSAG preprint does not batch
-
sarang
because CLSAG does not batch
-
sgp_[m]2
got it
-
sgp_[m]2
"but I can pretty safely say triptych 128 is faster to verify than clsag 16?" this is reasonably true then no?
-
sarang
I'd need to check if those numbers were on the same machine or not
-
sarang
If not, the wall times are meaningless
-
sgp_[m]2
yeah that's a critical assumption
-
sarang
If you build from source, you can make perf_tests for whatever params you like
-
sarang
I've run these numbers before, but I don't recall if I stored the results :/
-
sarang
sgp_[m]2: do you get PMs from freenode accounts?
-
sgp_[m]2
I should be able to
-
UkoeHB
sarang you can set yourself to +R to block spammers
-
UkoeHB
oh..
-
childofthecorn[m
What ring size is being targeted for the Triptych upgrade?
-
sethsimmons
~128
-
sethsimmons
But not set in stone AFAIK
-
moneromooo
This is a placeholder.
-
moneromooo
I just needed one.
-
childofthecorn[m
Ok, thanks.
-
childofthecorn[m
Also, has anyone created a comparison table of all the new ring signature proofs from the last year or so? Triptych, CLSAG, RCT3, Arcterus(?), etc
-
childofthecorn[m
It would be nice to see the tradeoffs and why Triptych was chosen over the others.
-
childofthecorn[m
Just to keep up to speed
-
sethsimmons
sarang or sgp_ would be the most likely to have something like that, I think!
-
moneromooo
sarang did, most are likely findable via
github.com/SarangNoether/skunkworks
-
childofthecorn[m
Thanks! I will dig through the branches and see what I find