-
midipoet
endor00: is this formall written in a paper/thesis anywhere? You also don't have any variable that accounts for hardware variances, unless i am not understanding?
-
midipoet
This is the Cambridge method:
ccaf.io/cbnsi/cbeci
-
m-relay
<endor00:matrix.org> midipoet not yet finished, unfortunately
-
m-relay
<endor00:matrix.org> The breakeven efficiency is the key here: it's the minimum efficiency (in H/s/W, or H/J) that the hardware needs to have in order to break even with the electricity cost
-
m-relay
<endor00:matrix.org> Looking at their methodology, it's the same as mine: they assume miners use hardware that is profitable - they call "profitability threshold" what I referred to as "breakeven efficiency" (though my formulae are a bit neater imo)
-
m-relay
<endor00:matrix.org> Plus they take into account the release dates and specs and sales data of hardware over time to estimate the average efficiency of the network
-
m-relay
<endor00:matrix.org> (And use the worst and best profitable hardware to estimate the upper and lower bounds for power usage)
-
m-relay
<rucknium:monero.social> MRL meeting here in two hours.
-
m-relay
<kayabanerve:matrix.org> 👋
-
m-relay
<rucknium:monero.social> Meeting time!
monero-project/meta #957
-
m-relay
<rucknium:monero.social> 1) Greetings
-
m-relay
<kayabanerve:matrix.org> 👋
-
rbrunner
hello
-
dukenukem
Hola.
-
vtnerd
hi
-
m-relay
<rucknium:monero.social> 2) Updates. What is everyone working on?
-
m-relay
<kayabanerve:matrix.org> I implemented GBPs into the FCMP repository. Variety of comments available from that.
-
m-relay
<rucknium:monero.social> me: OSPEAD. Related, I am pretty sure that the late December 2023 increase in tx volume (
bitinfocharts.com/comparison/monero-transactions.html#3m ) was someone spending many outputs as quickly as possible. The ring member age distribution shifted to be much younger than usual. In other words, probably spam like July-Aug 2021.
-
m-relay
<rucknium:monero.social> kayabanerve: You can save more time by explaining acronyms on first mention.
-
vtnerd
me: working on block difficulty computation in the "chain hardening" mode in lws. Still not sure the mode is worth it because I don't plan on having 2+ daemons for point of reference like p2p has
-
m-relay
<kayabanerve:matrix.org> The primary note is my impl is still ongoing. The circuit needs rearchitecture. The low level optimizations no longer still apply.
-
m-relay
<kayabanerve:matrix.org> The next comment is it may yield 2-6x performance increases *more than expected*. I was hoping for 35ms a proof. It may be a small fraction of that.
-
vtnerd
but basically Im trying to make sure the chain is valid with a certain level of difficulty, to make false chains from the daemon harder
-
m-relay
<kayabanerve:matrix.org> GBPs = Generalized Bulletproofs
-
m-relay
<kayabanerve:matrix.org> FCMPs = Full Chain Membership Proofs
-
m-relay
<rucknium:monero.social> kayabanerve: Did you see this paper?
eprint.iacr.org/2024/047 "On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing". Anything applicable?
-
m-relay
<rucknium:monero.social> vtnerd: Similar to bitcoin SPV wallet?
-
m-relay
<kayabanerve:matrix.org> Their abstract is wrong :C
-
m-relay
<rucknium:monero.social> Not a good start
-
m-relay
<kayabanerve:matrix.org> Just the claim Monero uses this.
-
m-relay
<rucknium:monero.social> What makes GBP "generalized"? Why is ordinary BP a special case?
-
vtnerd
yes, its likely similar. monero-lws is designed to run 24/7, so its got a better chance at detecting timestamp frauds
-
m-relay
<kayabanerve:matrix.org> So we perform a Pedersen hash for free.
-
m-relay
<kayabanerve:matrix.org> Technically, there's the overhead of the second proof needed for its output, and the blinding we need go transfer said values.
-
m-relay
<kayabanerve:matrix.org> The unblinding is done in-circuit and is... 1.25 gates * 161 trits? 250 gates (which are R1CS constraints). I hope to get that to 1.
-
m-relay
<kayabanerve:matrix.org> *200 gates.
-
m-relay
<rucknium:monero.social> 3) Discussion. What do we want to discuss?
-
m-relay
<kayabanerve:matrix.org> They're 258 constraints for their smallest space Rucknium. It's competitive, yet don't believe it'd be faster, even though it'd remove the overhead of the other proof.
-
m-relay
<kayabanerve:matrix.org> (sorry if I went too far into the math there)
-
m-relay
<rucknium:monero.social> ^ That's referring to the paper I posted?
-
m-relay
<kayabanerve:matrix.org> *They're 231
-
rbrunner
You wrote of a probable spam attack late December. How long did that last?
-
rbrunner
(Maybe not an attack, but spam.)
-
m-relay
<kayabanerve:matrix.org> Yeah. It uses ~15% more constraints. It would let us avoid a second proof, if we trust their hash function. That may be a fair trade off EXCEPT I'm planning to further reduce our constraints *and* we don't have our hash function take more time as the base does (they do. More elements hashed, more steps taken).
-
m-relay
<rucknium:monero.social> rbrunner: About two weeks. Shorter than the July-Aug 2021, which was 6 weeks I think.
bitinfocharts.com/comparison/monero-transactions.html#3m
-
rbrunner
I see. And I was hoping people start to buy each other Christmas gifts with Monero en masse ...
-
m-relay
<kayabanerve:matrix.org> So there's a bit of technical commentary which would need a full PoC to properly compare (2w-1m of work?). I don't think it'll end up more competitive *and* it has a fundamentally distinct security analysis.
-
m-relay
-
rbrunner
I wonder what a spam wave of only 2 weeks should be "good" for
-
m-relay
<rucknium:monero.social> The tx volume chart has a similar shape, too. Spike to double the tx volume, then gradually decrease back to the usual tx volume.
-
m-relay
<kayabanerve:matrix.org> Distinctly, I'd like to raise an idea to note, though I apologize for how I've already spoken quite a bit as I vocalized my analysis of that paper.
-
m-relay
<kayabanerve:matrix.org> Class groups. They're an extremely weird niche of cryptography I used for a side project. I'm also half convinced they're the solution to everything.
-
m-relay
<kayabanerve:matrix.org> We can trustlessly define a class group such that we can operate on arbitrary ECC elements, scalars or field elements, within an EC-like abstraction.
-
m-relay
<kayabanerve:matrix.org>
eprint.iacr.org/2022/419 is a constant sized, logarithmic verification time, ZK SNARK premised on them.
-
dukenukem
rbrunner: as Rucknium said, the ring member age distribution shifted to be much younger than usual. Deanonymization in a targeted set of txs., or specific tx., maybe?
-
m-relay
<kayabanerve:matrix.org> I'll make a research issue for it. No discussion is justified at this time. I just want to have people be aware of the term "class groups".
-
m-relay
<rucknium:monero.social> Yes, the spam incident can be a black marble attempt, but just double the tx volume isn't going to help an adversary much.
-
rbrunner
"solution to everything" meaning finding use in FCMPs as well?
-
m-relay
<rucknium:monero.social> On a different topic: koe did Seraphis performance tests for tx verification (
monero-project/research-lab #91#issuecomment-1047191259 ). But would things be different if storage I/O was part of the verification time? I assume that raising ring size to 128 from 16 would increase the storage I/O requirements because monerod would have to pull all those outp<clipped message
-
m-relay
<rucknium:monero.social> ut public keys from the LMDB for each ring sig verification.
-
m-relay
<rucknium:monero.social> RavFX 🤐 (RavFX) has brought this up.
-
m-relay
<rucknium:monero.social> And how does Curve Trees compare in I/O requirements?
-
m-relay
<kayabanerve:matrix.org> rbrunner: the fact there's a trustless, constant sized, logarithmic verification time SNARK means all proofs we want can be done. At worst, they'd just be horrible garbage with a million statements due to operating over non-native arithmetic.
-
m-relay
<kayabanerve:matrix.org> Class groups do enable people to find subgroups of order of any prime. This was applied in CL15 for an encryption scheme as *the discrete log problem is easy* for their subgroups. I'm double checking now if native arithmetic was enabled within Dew, or if that's future research.
-
m-relay
<kayabanerve:matrix.org> Even if Dew offers it, it won't beat a proper ECC construction, nor do I believe it'd beat a properly applied IVC construction. Class groups are ~2000 bits. Orders of magnitude slower, yet also with currently unique features.
-
m-relay
<kayabanerve:matrix.org> If ECC is a round hole, and we ever have a square peg, we can hammer it in with class groups. That's the main comment at this time.
-
m-relay
<rucknium:monero.social> Do you just have to get the Merkle root from the database?
-
m-relay
<kayabanerve:matrix.org> They have O(1) storage complexity to verify proofs.
-
m-relay
<kayabanerve:matrix.org> They just need the tree root. There's no random reads from disk.
-
m-relay
<kayabanerve:matrix.org> We'd define said root as the root for 10 blocks ago, and once a block is 10 deep, update the tree with that block's new enotes. That does require ECC operations, and my PoC delayed said operations until all enotes were added to demonstrate a batch update.
-
m-relay
<rucknium:monero.social> Maybe the Seraphis I/O performance can be tested once devs in #no-wallet-left-behind:monero.social have a Seraphis database.
-
m-relay
<rucknium:monero.social> I mean Seraphis with 128+ rings
-
m-relay
<kayabanerve:matrix.org> I also guess the tree edges, which are the elements updated, will be concise enough to fit into memory.
-
rbrunner
Yeah, I don't see anybody building something like a simulation just for such a speed test. Testing can probably indeed start if we have a Seraphis testnet running.
-
m-relay
<rucknium:monero.social> Anything more to discuss?
-
m-relay
<rucknium:monero.social> We can end the meeting here.