-
atomfried[m]
could this proposal be changed to researching an alternative, like seraphis etc?
-
atomfried[m]
-
xyy
how's this channel different from "Monero Dev"?
-
xyy
is this more experimental?
-
nikg83[m]
> <@atomfried:matrix.org> could this proposal be changed to researching an alternative, like seraphis etc?
-
nikg83[m]
-
nikg83[m]
Inmho, we should finish triptych multisig on paper and then decide if it’s usable/acceptable
-
moneromooo
It used to be about research specifically, but it now veered towards engineering. There's a large overlap.
-
Rucknium[m]
nikg83: Isn't Triptych multisig finished on paper?
-
nikg83[m]
Rucknium[m]: Documentation or poc is available?
-
Rucknium[m]
I'm going to bring this up at the next MRL meeting: Any CCS-funded work that is done "for" MRL by an "external" entity like CypherStack is managed by an extremely nebulous process/entity on the MRL side.
-
Rucknium[m]
Some nebulosity is fine, but we are really pushing the limits here. The cloud is turning into just thin air.
-
Reuben[m]
Inge I'm assuming you mean Halo2 on Orchard ? We are following but it's semi opaque esp with regards to performance. Interesting though. I still have my fingers crossed for something simple like Groth Bootle but extends to global anon sets. Most research nowadays that I have seen seem to veer towards the more complex general purpose zkp which is understandable I guess.
-
Inge
Reuben[m]: yes that was what I meant. And their anon sets are tempting - but perhaps 30-60k-ish moves away from "shell game" to practically untraceable
-
Rucknium[m]
Reuben: Inge Noob question: How would anonymity sets of 30k-60k affect transaction size and miner/node validation?
-
Inge
Rucknium[m]: it depends on the algorithm. With triptych/lelantus/omniring etc.. there is a logarithmig growth in transaction size - unfortunately, there is a linear growth in validation time
-
Halver[m]
<jberman[m]> "np :) this is also a great vid..." <- Indeed a great video. Very much appreciated. Thanks.
-
Halver[m]
-
Inge
xyy: monero-dev is related to the day to day programming. This channel is more talk about ongoing research for future development :)
-
Halver[m]
> <@jberman:matrix.org> np :) this is also a great vid by isthmus discussing the topic if you're interested:
youtu.be/XIrqyxU3k5Q could be mistaken but I believe the validation was added after that research
-
Halver[m]
* Indeed a great video. Very much appreciated. Thanks.
-
Halver[m]
Additionnal related stuff (slides etc) is here :
-
Halver[m]
-
Inge
Rucknium[m]: What Reuben is talking about is finding efficient batching that could improve the verification time, possibly allowing for huge anonymity sets
-
Rucknium[m]
But would tx sizes explode at rate log(N)?
-
Halver[m]
* Indeed a great video. Very much appreciated. Thanks.
-
Halver[m]
Additionnal related stuff (slides, graphics, etc) is here :
-
Halver[m]
-
Rucknium[m]
I guess it wouldn't be that bad:
-
Rucknium[m]
log(30000)/log(11) - 1 = 3.3 times larger, maybe?
-
Inge
Rucknium[m]: and current tx sizes are down almost 10x from pre-bulletproofs
-
Inge
12KB transactions was the norm
-
Rucknium[m]
If you go to 30k mixins, then enforcing a probability distribution for the mixin selection algorithm by blockchain consensus rules would almost certainly be necessary since any deviation from the standard reference wallet's implementation would stick out like a sore thumb.
-
sgp_[m]
<Rucknium[m]> "I'm going to bring this up at..." <- This really seems like something that's better for -community since it's CCS related. MRL has always been quite open. It's not like MRL is a real entity or anything anyway
-
sgp_[m]
There's a community meeting you can bring CCS related stuff in later today
-
sgp_[m]
* related stuff up in later
-
atomfried[m]
<sgp_[m]> "There's a community meeting..." <- is there a channel for such stuff? because my take on that is the more strict we are doing such stuff, the more "bureaucracy" and drama we introduce when it comes to CCS's and giving money to researchers, the less interesting it gets to work for MRL and researchers will just turn to other projects because of this, i know this is not the right channel for such discussions, so which
-
atomfried[m]
one is the right one?
-
sgp_[m]
atomfried[m]: #monero-community:monero.social
-
sgp_[m]
Best to keep this channel as devoid of that sort of stuff as possible
-
gingeropolous
Rucknium[m], i ponder at which ringsize a uniform distribution would be best?
-
gingeropolous
because at some n, perhaps the best thing is that no statistical test would work
-
Rucknium[m]
I think ring size = N , where N = entire UTXO set of Monero. Then that would be the point that uniform would be a good idea 😉
-
gingeropolous
lulz, roight roight.
-
Rucknium[m]
A statistical test against a uniform distribution is a test like any other. There is not much inherently special about uniform.
-
gingeropolous
i think statistical test for goodness of fit to a model would be really interesting, like as consensus. Basically, at this point an ideal thing would be a statistical test that is computationally cheap
-
gingeropolous
however, if we stick with a front heavy distribution, making a tx using an input from the head of the chain will theo always be easier
-
gingeropolous
and the older your output is, the more times you gotta roll
-
jberman[m]
Computationally cheap method of verifying a ring's distribution fits the expected distribution:
monero-project/research-lab #86#issuecomment-921805298
-
jberman[m]
constructing tx's via that method would probably be not so great for very large ring sizes (would need to re-roll a bunch), I'm guessing there is probably a formula to not need to re-roll at all. verification would be quick though regardless
-
jberman[m]
I could write up a separate issue that more clearly explains how that method works with charts and stuff if that would be useful
-
Rucknium[m]
jberman: I think it would be useful to simulate a distribution of, say, one million such rings constructed and then look at the mean, variance, skew, and a K-S statistic compared to the intended distribution
-
Rucknium[m]
That is what I did for my K-S-test-based rejection method. Setting rejection threshold at p < 0.05, the mean, variance, and skew were changed by about 1% compared to the target distribution. I suppose I could post the code.
-
Rucknium[m]
Yeah, maybe you should make a separate issue and we can post our code and compare results.
-
jberman[m]
That `special_selection_results.zip`file is a csv with 2 columns (outputs selected with that method, and outputs selected pure gamma), and 1.1mn rows
-
jberman[m]
will run some more tests over it
-
Rucknium[m]
We need to get that statistical server hardware funded so gingeropolous can put it together and improve collaborative workflow.
-
sakshamio[m]
Can we not do this analysis over google colab?
-
sakshamio[m]
Provides free gpus/tpus for such processing
-
sakshamio[m]
Plus the notebooks are collaborative
-
Rucknium[m]
sakshamio[m]: Some analysis may be sensitive and we don't want Google having access to it.
-
Rucknium[m]
jberman: Welp, here's R's C implementation of the K-S test, I think. If you wanted to try to do a C++ version. There are probably other fast implementations out there, in native C++ maybe.
-
Rucknium[m]