-
UkoeHB
meeting 2hr
-
UkoeHB
-
UkoeHB
1. greetings
-
UkoeHB
hello
-
xmrack[m]
Hi
-
Rucknium[m]
Hi
-
rbrunner
Hello
-
UkoeHB
looks like a low-turnout day, might be a short meeting
-
UkoeHB
2. updates, what's everyone working on?
-
xmrack[m]
I’m finishing up my final report for the magic grant which will be released Sept 1.
-
selsta
ooo123ooo1234567 posted an update on bulletproofs++ verification speed and it looks really promising for monero:
monero-project/research-lab #101
-
UkoeHB
me: closed my previous ccs and opened a new one
repo.getmonero.org/monero-project/ccs-proposals/-/merge_requests/338; started integrating tevador's mx25519 library into seraphis_lib to hopefully speed up the find-received scanning step (should have a performance test ready next week)
-
selsta
though I don't know what his plans are with the code now
-
Rucknium[m]
OSPEAD work. Some research into possible methods to probabilistically classify on-chain transactions by their decoy selection algorithms, which would decrease effective transaction uniformity.
-
UkoeHB
selsta: an almost 3x speedup seems too good to be true, looking forward to the code if/when it becomes available
-
selsta
UkoeHB: what part of the transaction verification is the bulletproof part? how would that translate to transaction verification?
-
UkoeHB
iirc it's around half of the cost
-
jberman[m]
me: I've been focused on wrapping up hard fork issues, atm specifically on more cleanly handling the case when an updated client connects to an older daemon and vice versa
-
jberman[m]
I said last week I'd have a plan for moving forward with multisig to get it out of experimental but have been prioritizing the above. Will share my thoughts on it
-
UkoeHB
ah looks like the batched verification isn't much faster in that test run
-
UkoeHB
the speedup in proof construction would be a big win, making bps is really slow
-
UkoeHB
3. discussion, anything to discuss?
-
UkoeHB
jberman[m]: ?
-
jberman[m]
Preliminary plan of action on moving multisig forward:
-
jberman[m]
Open discussion with veorq with UkoeHB involved if willing, explain we'd like to get security proofs written for multisig and that our goal is to arrive at a well-vetted and safe multisig implementation that we are confident is no longer experimental. Will work together with veorq/koe to try to help explain the code so the security proofs can cover the entire multisig protocol
-
jberman[m]
In that discussion, we'd discuss cost and time to completion estimates. Once we have a working framework established that is mutually agreeable toward achieving the above objective, would then look to funding
-
Rucknium[m]
Sounds good to me
-
UkoeHB
works for me
-
selsta
would these security proofs also apply to seraphis multisig later?
-
UkoeHB
not directly, because there is a new proof structure
-
UkoeHB
the new proof is basically a schnorr signature though, so existing multisig security proofs should be easy enough to adapt
-
selsta
ok, so we don't start with 0 again
-
rbrunner
So all multisig wallets need to get "dissolved" before the Seraphis hardfork?
-
UkoeHB
rbrunner: no, I have a migration strategy
-
rbrunner
Oh, surprising
-
UkoeHB
multisig groups just need to do one extra ceremony to migrate
-
Rucknium[m]
jberman, at the last meeting you said "I think a change to the algo that would result in identifiable pools without a HF needs a very high bar to pass" I think it's possible to reduce the question to direct probability calculations, i.e. probability of correct guess of the real spend with current DSA vs. probability of guessing the real spend based on a probabilistic classification of the DSA that a given transaction is using in
-
Rucknium[m]
a partial migration scenario.
-
Rucknium[m]
Is such a comparison what you had in mind for the criterion?
-
UkoeHB
-
rbrunner
Thanks, interesting
-
UkoeHB
oh, and you'd need to update legacy multisig accounts so they can do aggregation-style signing on legacy enotes
-
UkoeHB
that's on my TODO
-
Rucknium[m]
I have found a few candidate methods to classify on-chain rings by their DSA. xmrack may have additional ideas.
-
jberman[m]
If we have a high proportion of rings where the probability it's constructed by old DSA diverges largely from the new DSA, that would be a no-go imo
-
Rucknium[m]
No-go until a hard fork, I assume?
-
jberman[m]
right. unless we're certain there is some glaring issue that must be fixed
-
Rucknium[m]
There is a glaring issue. The question you pose, which you're right to pose, is if the cure is worse than the disease. Anyway, I think it's probably possible to get a clear, fairly precise answer on that.
-
jberman[m]
sgtm
-
Rucknium[m]
I'm probably going to need more funding for that analysis though 😅
-
UkoeHB
are there any other topics anyone would like to discuss? questions?
-
UkoeHB
ok I'll call it here, thanks for attending everyone
-
UkoeHB
selsta: there aren't many google hits for bp++, do you think we should hit up bunz's team and possibly some others to review the paper?
-
Rucknium[m]
We could also ask the paper's author if he has submitted it for publication anywhere.
-
selsta
it would be great if ooo123ooo1234567 could clarify his plans on how to continue with bulletproofs++ now, he did say he spent time on checking security but i don't know what that entails
-
Rucknium[m]
kayabanerve: Want to email the BP++ author and ask if it is under review anywhere?
-
selsta
otherwise we can either try to contact the paper author or like you suggested someone who was involved with Bulletproofs
-
selsta
quite sure the author of B++ works for spacex now
-
selsta
so no idea how available he is
-
Rucknium[m]
How did you come across that info?
-
selsta
linkedin
-
selsta
i was curious what their background was
-
selsta
but that was a couple months ago could be outdated at this point
-
UkoeHB
I will contact the bp++ author
-
selsta
UkoeHB: is batched verification the only thing relevant for us?
-
selsta
apart from generating proofs
-
Rucknium[m]
Thanks. I didn't want to do it since I don't understand cryptography
-
UkoeHB
selsta: also 256 byte smaller proofs
-
selsta
i meant solely regarding verification
-
selsta
either way it is a nice upgrade with basically everything improved
-
xmrack[m]
Does anyone know Sarang’s opinion on the BP++ paper?
-
UkoeHB
he has not made any public comments on it that I'm aware of
-
rbrunner
-
UkoeHB
thanks rbrunner
-
rbrunner
Welcome. Thank you for you perseverance and still forging on :)
-
UkoeHB
BP++ author says he's working on conference submission(s). He would like to see the BP++ code if possible
-
Rucknium[m]
Good to hear :)