-
xmrack[m]
-
xmrack[m]
kayabanerve:
-
kayabanerve[m]
Thanks for the update
-
narodnik
i can never make this meet cos i have a math study course conflict
-
moneromooo
If there is something in particular you'd like to discuss, it's perfectly fine to announce in advance you'll be around at such time to discuss such subject, and anyone who wants to be around to discuss it then is welcome.
-
moneromooo
The same kind of time on another day is likely prefered for timezone reasons.
-
moneromooo
Or just write your comments on whatever issues you want to comment on, if you're not looking for discussion, just giving feedback/opinion.
-
Rucknium[m]
Great job on the P2Pool payout efficiency upgrade, sech1! In preliminary data I am already seeing an impact on mean empirical effective ring size. Last week it was about 13.5 . So far this week it is about 14.25. (Ideal is 16.)
-
Rucknium[m]
It will take a few weeks for the majority of the impact to appear because of how the decoy selection algorithm selections historical outputs. So I will wait a bit to post charts.
-
Rucknium[m]
I am using the definition of Empirical effective ring size = Consensus-enforced ring size minus Number of coinbase outputs in each ring on the blockchain.
-
sech1
Ideal is not 16, you have to account for ~720 coinbase outputs that appear on the chain every day in any case
-
sech1
so it's close to 16, but not exactly 16
-
Rucknium[m]
16 minus epsilon. Asymptotically 16 :)
-
Rucknium[m]
Just a reminder for observers of the channel what the max is.
-
sech1
720 coinbase outputs is about 1-2% of all outputs, given ~20k tx/day
-
sech1
so ideal should be 16*0.99 = 15.84? If my math makes sense
-
moneromooo
The above is because miners are deemed to always/mostly consolidate, rather than actually spend ?
-
moneromooo
s/spend/use without consolidation/
-
sech1
Big pools make payouts once every few hours, or just once a day. If on average they find multiple blocks between payouts, they have no option but to consolidate.
-
Rucknium[m]
Yes "In most transactions, p2pool outputs can be ruled out as the real spend because p2pool miners need to consolidate their payouts in transactions with a large number of inputs. Furthermore, the miners' addresses are in plaintext on the p2pool side chain, observable by Monero privacy adversaries."
monero-project/research-lab #109
-
Rucknium[m]
(quoting myself)
-
sech1
And yes, p2pool miners almost always consolidate
-
DataHoarder
on that Rucknium working on producing that data regarding p2pool identifiable consolidations
-
DataHoarder
will re-import all p2pool history around and build the output index table for fast lookups
-
Rucknium[m]
DataHoarder: Thanks!
-
UkoeHB
Meeting 3hr
-
atomfried[m]
is there a special room for the meeting?
-
rbrunner
No, should start here now
-
Rucknium[m]
This is the room. ⏰
-
xmrack[m]
Youre in it, meeting should start momentarily
-
Rucknium[m]
UkoeHB usually starts it.
-
Rucknium[m]
I will wing it. Meeting time!
monero-project/meta #815
-
Rucknium[m]
Say hi everyone
-
Rucknium[m]
Hi
-
rbrunner
Hello
-
xmrack[m]
Hey
-
dangerousfreedom
Hello
-
jeffro256[m]
Howdy
-
Rucknium[m]
Updates: What is everyone working on?
-
hinto[m]
hello
-
Rucknium[m]
me: have preliminary script to collect all RingCT rings. So far I have used it to check how the P2Pool payout efficiency upgrade has improved effective ring size:
github.com/Rucknium/misc-research/t…ree/main/Monero-Effective-Ring-Size
-
Rucknium[m]
This can be used to check the effect of Mordinals/NFTs on effective ring size if and when I parse tx_extra for Mordinals' designated tag
-
xmrack[m]
I’ve been working on adding k-anonymity to the monero block explorer to give users more privacy.
-
Rucknium[m]
isthmus has closed his work-in-progress CCS to help with computational speedup of OSPEAD due to not enough labour bandwidth. I am seeking other forms of help now.
-
dangerousfreedom
I'm working on the transaction_history for the seraphis_wallet which will be a layer above the "seraphis_engine".
-
xmrack[m]
I have it working for blocks at the moment but need to add a range search to Lmdb to allow for transaction hashes. Hyc is helping me with that
-
blankpage[m]
What is k-anonymity?
-
xmrack[m]
-
blankpage[m]
Thanks
-
UkoeHB
ah crap got distracted, hi
-
Rucknium[m]
The deadline for MoneroKon submissions is April 3rd:
cfp.monerokon.com/2023/cfp
-
xmrack[m]
Tl:dr instead of a user requesting a single tx hash which the block explorer can confidently assume belongs to the requesting ip address. They will provide the first 5 characters of the hash and the explorer will return all possible k matches. Hence, k-anonymity
-
atomfried[m]
i just started looking into the new rangeproof a bit and try to understand it
-
ArticMine
hi
-
plowsof11
hi
-
rbrunner
To use that, I will just need some HTML with a form and the necessary JavaScript to issue to that newly k-anonymity capable block explorer?
-
plowsof11
Rucknium: (diego is here on hand for when bp++ peer review funding is to be discussed)
-
DiegoSalazar[m]
ye
-
UkoeHB
my update: did a refactor of the seraphis scanning framework to better support async backends, right now working on integrating checkpoint caches into the seraphis enote store
-
blankpage[m]
Do any other XMR block explorers have k-anonymity? This seems like a great privacy improvement for the general user
-
Rucknium[m]
plowsof: IMHO, we should discuss that first since tx_extra is potentially unlimited discussion:
repo.getmonero.org/monero-project/ccs-proposals/-/merge_requests/358
-
xmrack[m]
rbrunner: yea javascript will be needed, unfortunately, to filter all the data returned
-
xmrack[m]
It should be super straightforward from the frontend perspective
-
Alex|LocalMonero
xmrack[m]: What about the compact filters approach that Neutrino uses?
-
rbrunner
I see, thanks
-
UkoeHB
plowsof11: it looks like the bp++ paper is still not updated
-
Rucknium[m]
xmrack: IMHO, timing is still an issue with 5-character hash prefix.
-
plowsof11
after 3+ months wait - the bp++ paper has not been updated, and my lines of communication with the author have dried up. correct UkoeHB
-
atomfried[m]
depending on how "Range Proofs with Constant Size and Trustless Setup" performs, we could maybe skip bp++ and just use this instead?
-
UkoeHB
plowsof11 I thought blockstream hired him, maybe worth reaching out
-
Rucknium[m]
You would only get about one tx per week with 5 character prefix I think. Most people look up recent txs
-
UkoeHB
atomfried[m]: it sounds like that new paper is missing a proper security model
-
Rucknium[m]
I suggested that we return to the CCS after 3 months if there was no paper update. It has been three months
-
UkoeHB
ah
-
atomfried[m]
UkoeHB: yes, thats not included in the paper, maybe it was not in the paper due to a pagelimit
-
xmrack[m]
Rucknium: timing data should have no effect on this. All data is sent to the client, then the client loops through the data and pulls out the block/tx they want
-
blankpage[m]
The authors of the constant size rangeproofs (needs a shorter name!) will be at the meeting next week yes?
-
xmrack[m]
The 5 character prefix is subject to change. I need to run benchmarks to see what acceptable bandwidth looks like
-
plowsof11
move bp++ peer review to funding as is vote? or
-
Rucknium[m]
blankpage: Good point. Maybe the next step will be clearer once we discuss that paper with the authors
-
blankpage[m]
For example we could ask "do you have a security model?"
-
xmrack[m]
blankpage: yes they mentioned they were busy today but will be here to answer questions next week
-
rbrunner
Do we know how far vtnerd is with their BP++ implementation already?
-
ofrnxmr[m]
move bp++ peer review to funding as is vote? or wait for next week after constand sized range proofs meetings?
-
rbrunner
Paper authors sort of vanishing make me a bit nervious ...
-
blankpage[m]
Or the CCS is rewritten as "research, implement & audit next generation range proofs" so that it covers b++ and/or the new thing
-
ofrnxmr[m]
(Putting up for funding leaves time to raise the money so we are ready when/if. Can always repurpose the funds for alternative solution)
-
plowsof11
i think its a simple case of : he is now employed / busy on other things, i can make a last attempt to contact blockstream before next weeks meeting?
-
Rucknium[m]
Blockstream's focus is BTC. They probably don't particularly want to help Monero FWIW
-
plowsof11
i have this feeling too
-
ofrnxmr[m]
blankpage: sounds good to me - anybody against?
-
blankpage[m]
xmrack I guess the consideration is whether the block explorer has a powerful heuristic by guessing that the intended query is the most recent of the returned set of k.
-
rbrunner
Don't have clear and focussed CCS a better resonance than such "this or maybe this"?
-
Rucknium[m]
I would not be in favor of a CCS that is so vague on what the task is and who would accomplish it
-
rbrunner
Usually it does not take long to fund a CCS, I would say. We probably won't bump against a wait of, say, a month or so.
-
blankpage[m]
Considering the "open ended" nature of this stuff, is MAGIC maybe a better fit?
-
rbrunner
Well, it's only open ended if we don't bring with us the patience to wait until we have a clear direction :)
-
Alex|LocalMonero
xmrack: the problem you're trying to solve is known as "private information retrieval", or PIR, and it's been around for a while. You need homomorphic encryption to make a block explorer that truly knows nothing about what the client is asking for. Such an explorer exists for Bitcoin in an experimental state:
btc.usespiral.com I know the developers and can get you in touch with them so that you can make a similar
-
Alex|LocalMonero
one for XMR.
-
blankpage[m]
Blockstream uses rangeproofs BTW for confidential amounts on their "liquid network". Idk if they are jumping into this new rangeproof though.
-
ofrnxmr[m]
rbrunner: has nothing to do with patience
-
xmrack[m]
blankpage: ahhhh I see, I thought you meant side channel timing data like packet times. Guess newest heuristic could be true especially singe I will need to scan the mempool. I will work with Rucknium to figure it out
-
Alex|LocalMonero
It uses lattice-based cryptography.
-
xmrack[m]
*since
-
plowsof11
rewrite the ccs = back to the drawing table for quotes from multiple companies
-
ofrnxmr[m]
So for now plowsof @plowsof:matrix.org: sounds like do nothing
-
xmrack[m]
Alex | LocalMonero | AgoraDesk: sounds interesting
-
atomfried[m]
Alex|LocalMonero: could this also work for light wallets?
-
Alex|LocalMonero
atomfried[m]: Probably but it's way more complex due to homomorphic encryption constraints.
-
Rucknium[m]
IMHO, more programmer-cryptographers like koe and kayabanerve should give opinions about what to do about the BP++ paper
-
Rucknium[m]
And wait for the new rangeproof paper authors next week
-
Alex|LocalMonero
-
kayabanerve[m]
👋
-
Alex|LocalMonero
Homomorphic encryption allows you to perform operations on encrypted data without decrypting it. Such as checking an address for txs.
-
kayabanerve[m]
Just finished reading up
-
Alex|LocalMonero
The downside is that its very space-inefficient nowadays.
-
plowsof11
sounds good, we can TBD next week, thanks for attending Diego Salazar
-
DiegoSalazar[m]
ye
-
Rucknium[m]
Homomorphic encryption is quite bleeding edge AFAIK...meaning users may get cut
-
kayabanerve[m]
BP++ is beyond me. I can't encourage deployment without review from people its not.
-
Alex|LocalMonero
Rucknium[m]: PIR block explorers are probably the least dangerous production battleground to test this tech out.
-
kayabanerve[m]
My one candidate is sarang. I would hold off until this constant time proof has an initial eval. That means source access + benchmarking + a security proof.
-
Rucknium[m]
Alex | LocalMonero | AgoraDesk: You're probably right.
-
kayabanerve[m]
Currently, I believe the authors didn't make a CSRP sec proof. I have heard commentary the applicability is a bit... Hand waved.
-
kayabanerve[m]
I look forward to hearing more from the authors on the matter. They didn't respond to me, yet someone else. I believe they'll be here next week?
-
Alex|LocalMonero
xmrack:
github.com/ahenzinger/simplepir is currently the fastest PIR server I know.
-
Rucknium[m]
I don't think BP++ has a security proof either. Does it?
-
kayabanerve[m]
If CSRP doesn't have a sec proof, I'd move forward with BP++.
-
kayabanerve[m]
I believe ++ has a proof, yet also a TODO somewhere in the paper?
-
kayabanerve[m]
I don't believe that TODO is relevant to us but I can double check now.
-
UkoeHB
yeah might as well stop waiting on BP++
-
kayabanerve[m]
TBC, without a publication for and proof of CSRP, it's interesting but a non starter.
-
kayabanerve[m]
I'm willing to wait a week to hear back from the CSRP authors, as I do believe they're interested in attending next week's meeting...
-
Rucknium[m]
kayabanerve: Thanks for your input
-
plowsof11
the peer review is step 1 of <many> , entire project is being delayed imo
-
kayabanerve[m]
BP++, 8.1, proving and verification time is incomplete. 9, proofs, is not.
-
kayabanerve[m]
xmrack: Are they trying to attend the meeting next week?
-
xmrack[m]
Yes
-
kayabanerve[m]
Just triple checking :)
-
kayabanerve[m]
I'd call to hold off on any decisions until after then.
-
kayabanerve[m]
But BP++ should be moved forward with.
-
Rucknium[m]
kayabanerve: "moved forward with"?
-
kayabanerve[m]
And while I don't want to force a topic change, I do have a question for tevador of larger interest.
-
kayabanerve[m]
Rucknium: There's no reason to hold off on it currently, other than potential greater interest in this constant sized proof.
-
DataHoarder
xmrack[m]: Ideas for doing k-anonymity client side without JS, use fragment hash CSS styling of page via targeting
stackoverflow.com/questions/3655278…ent-identifier-hash-in-the-url-refe but the hard part would be sending the user to the proper page (maybe abuse max length on fields) JavaScript
-
DataHoarder
could be needed to redirect user to results page, but not on the filtering part. Maybe good for linking to the page by other places
-
kayabanerve[m]
If the CSRP becomes a non-factor, we should conduct peer review on it.
-
Rucknium[m]
kayabanerve: Go ahead and change topics
-
kayabanerve[m]
tevador: I don't believe an indirect curve cycle is possible due to the fact we need to do an ECC op *and* membership. Do you have any thoughts on this?
-
kayabanerve[m]
To be clear, the proof needs to substract the blinding factor, then prove the unblinded point is a member. tevador found an efficient indirect cycle, letting us stay on Ed25519, but the indirect cycle *can't* do ECC ops unless it rebuilds a calculator on the arithmetic level.
-
kayabanerve[m]
*binary level
-
kayabanerve[m]
Completely infeasible
-
kayabanerve[m]
So that means we'd need to do ECC ops on the tower, and then use that unblinded point on the cycle. I'm unsure we can efficiently do that since we have to maintain ZK.
-
kayabanerve[m]
We can trivially prove the ECC op on the tower, get the output point, and move that to the cycle. It just wouldn't be ZK.
-
kayabanerve[m]
... It may be possible with a Pedersen commitment? And then we'd have to prove two EC ops on the tower and open the commitment in the cycle?
-
kayabanerve[m]
Anyways. I wanted to get tevador's thoughts in this and if I wasn't missing anything, move the discussion back to switching curves, despite the potential avoidance noted by tevador.
-
kayabanerve[m]
... Doesn't seem like we'll get a response this meeting 😅 My thoughts/updates on the SNARK design discussion have been made available. I don't have anything else to say as part of it right now :) Thanks for the opportunity Rucknium:
-
Rucknium[m]
Meeting is over :)
-
plowsof11
Thanks for hosting Rucknium, and all in attendance 🙏
-
Alex|LocalMonero
Thanks Rucknium ❤️
-
ofrnxmr[m]
Thanks Ruck, Koe, and Kaya