-
Rucknium[m]
There is a meeting in this channel in about 40 minutes
-
Rucknium[m]
-
UkoeHB
ah crap time change
-
disclosure-bot-x
To all meeting participants: please disclose any potential conflicts of interest.
-
UkoeHB
lolwut
-
Rucknium[m]
Where did this disclosure bot come from?
-
wfaressuissia1
secret keys too ?
-
Rucknium[m]
disclosure-bot-x: Please define "conflict of interest"
-
UkoeHB
meeting time:
monero-project/meta #626 (for those who time changed, now 1700UTC comes an hour earlier)
-
UkoeHB
1. greetings
-
UkoeHB
hello
-
carrington[m]
Hi!
-
Rucknium[m]
Hi
-
rbrunner
Hello
-
wfaressuissia1
Hello
-
ArticMine
Hi
-
UkoeHB
2. let's start with updates; what has everyone been working on lately?
-
UkoeHB
Me: I completed my Seraphis PoC for performance testing, and started collecting test results (thanks to gingeropolous for his help :)). While doing that, I discovered a rare bug (
monero-project/monero #8052).
-
Rucknium[m]
Analysis of UkoeHB 's cryptography performance benchmarks. Finished final version of OSPEAD CCS proposal. Gave initial thoughts on the "decoy collision" issue raised by an Aeon dev. Brainstorming about research-specific funding mechanism. BCH work.
-
UkoeHB
If no one else has updates, we can move on. We might be missing people due to the time change.
-
UkoeHB
3. discussion; anyone want to discuss something from the agenda?
-
carrington[m]
Myself and spirobel are in early discussions of putting together a hub for monero-related research
-
carrington[m]
Paper summaries, categorizations, RSS feeds etc. Etc.
-
Rucknium[m]
Oh, right! I wanted to discuss that. We should make a bounty and think about what the requirements should be.
-
wfaressuissia1
"a hub for ... research" what does it mean ?
-
Rucknium[m]
Tentative name: "Where to Find Monero Research: moneroresearch.wtf" I bought the domain name.
-
Rucknium[m]
wfaressuissia[m]: The number of papers on Monero being published by external researchers has skyrocketed. We are not keeping up with reading them.
-
carrington[m]
wfaressuissia[m] there are many academic papers published about XMR and XMR-related topics which are basically being ignored by the visible community
-
Rucknium[m]
Moser et al. (2018) alone now has over 80 citations.
-
wfaressuissia1
citations don't mean that paper is the main reference
-
carrington[m]
Anyways, this is very early stages so not much more to say there
-
Rucknium[m]
wfaressuissia[m]: We don't even know that since we haven't read the papers. That's part of the problem.
-
UkoeHB
thanks carrington[m]
-
carrington[m]
If anyone is hiding away their own private infodump of papers and relevant research please sling it my way
-
Rucknium[m]
I think it would be good to have a portal that automatically pulls papers and their essential data (authors, title, abstract, etc.) based on keyword search and/or when key papers are cited. And maybe even allows a permissioned login system to make brief notes about the paper.
-
Rucknium[m]
carrington: Will do.
-
atomfried[m]
Rucknium[m]: like google schoolar?
-
Rucknium[m]
Google scholar API could help, yes. There are other systems, too, that could be pulled from.
-
carrington[m]
I'd be looking to write an abstract-style "how this relates to Monero" for those papers where the connection isn't obvious
-
carrington[m]
Anyways, regarding actual research, is there anything we can say about these performance numbers at this stage?
-
Rucknium[m]
UkoeHB has just generated new performance data. Is it ready for me to analyze, or still tweaking, UkoeHB ?
-
UkoeHB
It is ready; this time in csv format too :p
-
Rucknium[m]
Nice :) Although all my parsing code is now useless I suppose. A negligible sunk cost.
-
wfaressuissia1
It would be more useful to have list of search engines (ideally working via tor too) for papers where anyone can get results for any keyword (not only monero)
-
rbrunner
Do number already allow to speculate about the final overall speed of "Monero on Seraphis"? Will it sync the blockchain slower? Much slower? Faster? Will wallets scan faster? Etc.
-
Rucknium[m]
Good thing I ran into parsing issues or it may have taken more time to realize that bug exists.
-
rbrunner
*numbers
-
UkoeHB
hah yeah 1 in 600k cases...
-
UkoeHB
rbrunner: it should allow relative comparisons of blockchain sync times with different parameters
-
Rucknium[m]
wfaressuissia[m]: I would prefer a shared repository for the papers, or the abstracts of the papers at least.
-
UkoeHB
Wallet scanning is a separate issue
-
rbrunner
I see. But maybe the speed comparison with Monero as it is now will fall out of this as a by-product? Maybe not.
-
UkoeHB
Yes it should allow comparisons with current Monero
-
UkoeHB
Since I collected results for CLSAG
-
rbrunner
Ah, interesting.
-
UkoeHB
CLSAG after BP+ and ring size 16*
-
ArticMine
This is very interesting. Link?
-
rbrunner
So it might show soon which the direction things will take.
-
ArticMine
... and useful
-
UkoeHB
ArticMine:
github.com/Rucknium/misc-research/t…main/Monero-Cryptography-Benchmarks I think Rucknium[m] will upload the latest data at some point.
-
Rucknium[m]
-
rbrunner
Bleeding edge research :) Even the stats have bugs ...
-
UkoeHB
rbrunner Monero code had bugs, not the stats :p
-
UkoeHB
-
rbrunner
That was enough to affect outcome? Surprising.
-
Rucknium[m]
The issue was that extremely rarely the verification would fail, so the results would not be output. And the failure mode made parsing difficult
-
ArticMine
Thanks
-
Rucknium[m]
How about: "Seeing a bug in Aeon transactions where multiple inputs in one transaction use the same output. "
monero-project/monero #8047
-
Rucknium[m]
It's not really a bug. It's just how things work now. The question is whether there are any costs or benefits to trying to avoid these "collisions".
-
carrington[m]
This seems to be a consequence of small rings, but the privacy hit is not as big as the fact that the rings are small anyways
-
Rucknium[m]
The collisions would seem to happen much more often on Aeon rather than Monero since Aeon has much fewer transactions and therefore fewer outputs to choose from in a given time window.
-
UkoeHB
It makes the implementation simpler when there are few outputs in the chain (just after hardforking to a new epoch).
-
rbrunner
You should look at the rings on Monero testnet, where we have fewer txs still. Sometimes they look *really* funny. But I can't see how that matters.
-
Rucknium[m]
Wait, under what circumstances would the decoy selection algorithm not be able to select outputs from before a hard fork?
-
carrington[m]
Any privacy hit would be dependent on external data. E.g. if the duplicated decoy is a known spent output, then you lose 2 decoys instead of 1
-
UkoeHB
I believe that happened when RingCT went live. It will also happen if Seraphis goes live.
-
UkoeHB
It happens when you need to transition for some reason. E.g. transition to hidden amounts, or transition to a new key image construction.
-
Rucknium[m]
Oh boy, more statistical issues to dive into!
-
rbrunner
Er ... and the very first new txs have nothing at all to select as decoys?
-
carrington[m]
Interesting. Maybe we should organize users to spam the network with churned transactions at the upgrade time?
-
Rucknium[m]
It seems strange since old genuine outputs can be spent.
-
wfaressuissia1
if there would be any advantage in doing this activity then any attacker could do the same, so it's useless
-
wfaressuissia1
this system should work independently from any users actions
-
UkoeHB
When old outputs get spent, the new outputs in their tx are 'in the new format'. Also, new coinbase outputs are 'in the new format'.
-
Rucknium[m]
So some of the ring members would have the old format and some would have the new format. It seems that decoys could still be selected from before the hard fork, right?
-
UkoeHB
No, rings can only have outputs with a single format. So all new outputs would be in 'new format tx'.
-
carrington[m]
So when you spend a very old CLSAG output, it will be obvious that you are doing so? Because of no recent decoys selected
-
Rucknium[m]
Ok. So there would be a mix of old-style and new-style. Um, let me get this straight...
-
UkoeHB
Correct
-
UkoeHB
This is an unavoidable engineering problem.
-
rbrunner
Well, still not clear how long before the hardfork that old output came into existence, right?
-
wfaressuissia1
s/unavoidable/unsolved
-
Rucknium[m]
[old,old,old]-->[new] , [new,new,new]-->[new] would be allowed after the hardfork
-
Rucknium[m]
[old,new,new]-->[new] , [old,old,old]-->[old] would not be allowed.
-
rbrunner
And that it's CLSAG is obvious anyway
-
UkoeHB
Rucknium[m]: yes
-
jberman[m]
I think preventing duplicates is the technically correct thing to do from a stats perspective. In the tx sanity check, it first checks if there are >10k outputs available to use before checking there is only a small margin of duplicates. Could do something like that in the wallet to avoid challenges around fork time to a new format
-
Rucknium[m]
UkoeHB: Ok. There are many thorny statistical issues in such a hard fork, then. We can research how to have a smooth transition.
-
merope
How would the decoy selection look like when spending an old clsag output? Would it still follow the usual distribution (just traslated to older blocks), or would it change?
-
UkoeHB
merope: that sounds like an _open research question_ :)
-
merope
Hehe
-
Rucknium[m]
UkoeHB: Yes, that's what I'm saying. Needs study.
-
merope
Random thought: there should be a stroger bias towards older outputs after a while, because otherwise the last clsag outputs will show up in multiple conversion transactions, while the older ones would show up only once at most (ie when they actually get spent for conversion)
-
merope
(Just throwing that in open)
-
merope
I guess we could look at the pre-clsag to clsag conversion txes for reference
-
rbrunner
Looks like a whole new can of worms opened today.
-
carrington[m]
Wouldn't all the CLSAG outputs eventually end up in the long tail of the distribution? So little difference between older or newer CLSAG outputs
-
UkoeHB
merope it would be pre-ringct to ringct
-
merope
Oh right
-
Rucknium[m]
rbrunner: I agree. Yum! Tasty research worms! 😋
-
jberman[m]
we could analyze older data of known spents too, but ignore the X most recent outputs at any point in time, and look at different values of X
-
Rucknium[m]
Before we close, I would invite everyone to think about what an independent funding mechanism focused specifically on research could look like, and maybe post your thoughts in #monero-research-lounge:monero.social
-
jberman[m]
hmmm, in this case, maybe it makes sense to "throw away" the portion of the gamma curve (or whatever curve is used) that is unrepresented. So as you move further away from the fork height to a new format, you start ignoring a larger and larger portion of the curve that is more recent
-
wfaressuissia1
Is that doc still private ?
-
UkoeHB
wfaressuissia1: what doc?
-
wfaressuissia1
rucknium[m]: your document ...
-
Rucknium[m]
My HackerOne submission is still private. I edited the language on disclosure in my CCS proposal recently.
-
Rucknium[m]
The "Document A", i.e. OSPEAD technical specification, is still getting feedback, and I hope to push out a public version within the next week.
-
UkoeHB
Ok we are at the end of the hour. Thanks for attending everyone.
-
jberman[m]
also update from me: initial view tag implementation is finished, working on finalizing tests at this point. Sorry the daylight savings time switch messed me up
-
wfaressuissia1
How would you test new mechanism for decoy selection without any tools written by mj-xmr ? Are there no open source alternatives ?
-
wfaressuissia1
rucknium[m]: for you
-
Rucknium[m]
wfaressuissia[m]: Yes, there are a million open source alternatives. One of the main benefits I get from using mj-xmr's tools is that I have another time-series-oriented person to bounce ideas off of.
-
Rucknium[m]
My research can proceed without use of mj-xmr's tools, but they are nice to have.
-
one-horse-wagon[
<jberman[m]> "also update from me: initial..." <- Same thing happened to me.
-
yanmaani
Has there been any research done on homomorphic encryption for chain sync?
-
UkoeHB
yanmaani: probably no
-
yanmaani
i imagine there's no way to avoid it being O(n) over the history
-
UkoeHB
Not without privacy losses (eg using an ‘account’ model instead of ‘txo’ model).
-
yanmaani
UkoeHB: I mean, can't ElGamal for example do multiplication of two ciphertexts?
-
yanmaani
a*b*c*d*e*f = 0 if any of those are 0
-
yanmaani
and decrypting random data gets you (except with negligible probability) non-zero, right
-
yanmaani
so if each transaction had a field with encrypt(0, viewkey), wouldn't that enable you to do this, with the right cryptosystem etc?