00:06:13 https://blog.google/technology/research/google-willow-quantum-chip/ 00:06:13 https://gist.github.com/kayabaNerve/e5b262c5efefcfcfa32748a0d99bc0e1#the-future 00:06:15 > I am explicitly proposing immediately starting a parallel research and development effort on a post-quantum protocol. 00:06:43 It's up to y'all to do whatever with my opinion there but it's probably worth raising here with the recent news demonstrating mounting pressure. 01:54:27 Fwiw, MAGIC Grants has raised money with the intent to help research and implement solutions for this specifically. Significant resources are already available 13:04:28 I'll profit from the post-quantum discussion to make a request: Most users are on monero.social instance, can we guarantee before QDAY happen that the entire matrix instance get erased. 13:05:31 Useless if we consider *Harvest now, Decrypt later* but I think it is still sane to do so. 13:06:30 Since cross monero.social direct message do not leak to the internet 13:07:29 Since cross monero.social direct message do not leak to other instances 13:07:59 Is there a Quantum Research channel for Monero? 13:08:43 no 14:04:54 https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-december-7-2024 14:05:46 Russia apparently isolated 3 regions from the internet, if they are big enough to include some nodes, this would be pretty interesting to keep an eye on. 14:06:59 ``` 14:06:59 Russian federal censor Roskomnadzor appears to be testing the Russian sovereign internet in Russian regions populated by ethnic minorities. Dagestani telecom operator Ellko reported that Roskomnadzor conducted a test to revoke Republic of Dagestan residents' access to foreign websites and applications from December 6 to 7, and Radio Free Europe/Radio Liberty's Caucasus service rep 14:07:01 orted that users in Dagestan also experienced issues accessing WhatsApp and Telegram social media and messaging services.[22] Dagestani publication Chernovik reported that users in the Chechen and Ingushetian republics also experienced issues accessing foreign and some domestic websites and online services, including YouTube, Google, and some services of Russian internet giant Yan 14:07:03 dex — even with virtual private networks (VPNs).[23] Roskomnadzor confirmed on December 6 the test in the Republic of Dagestan and stated that the test is to ensure that "key replacement infrastructure" can function if Roskomnadzor deliberately disconnects Russia from the global internet.[24] Roskomnadzor likely intended in part to test its ability to successfully disconnect Che 14:07:05 chnya, Dagestan, and Ingushetia — Russian federal subjects with Muslim-majority populations and recent histories of instability — from services like Telegram in order to control the information space in the event of instability in the future. Roskomnadzor previously attempted to disconnect users in the Dagestan, Sakha, and Bashkortostan republics from Telegram during antisemit 14:07:07 ic pogroms in November 2023 and protests in January 2024.[25] The Kremlin has recently invested roughly 59 billion rubles (about $648 million) into developing its technical capabilities to restrict internet traffic and has devoted efforts to compelling Russians to migrate from Western social media platforms to domestic platforms that the Kremlin can more easily control.[26] 14:07:09 Roskomnadzor indicated that it may intend to force Russians to migrate their websites from Western hosting providers to Russian hosting providers likely to better enforce Russian censorship laws. Roskomnadzor also warned on December 7 that it could block eight foreign web service hosting providers, including Amazon Web Services (AWS), GoDaddy, and HostGator, from operating in Russ 14:07:11 ia due to noncompliance with Russian censorship laws.[27] Roskomnadzor has previously issued such warnings ahead of blocking Western websites and online services likely to test the reaction to these blocks before implementing them and pressure Russians to switch to domestic, Kremlin-approved and -controlled platforms and services.[28] 14:07:13 ``` 21:03:35 Opened a discussion on MRL repository: https://github.com/monero-project/research-lab/issues/131 21:04:55 My starting introductory point is that I agree with KayabaNerve and we're just or too late in time to not start implementing post-quantum security. 21:05:16 My starting introductory point is that I agree with KayabaNerve and we're just or too late in time to start implementing post-quantum security. 21:07:48 Obviously I hope MRL members will be able to link other important points or discussions that might have been happened and not included in the original comment. cc: Rucknium 21:24:10 Opened a discussion in MRL repository: https://github.com/monero-project/research-lab/issues/131 22:14:32 is it possible to do one-time blinding for the amount commitment? 22:18:23 Amount commitments are already perfectly blinded, so long as the QC doesn't know your Monero address 22:20:31 At a fundamental level, if we use ECDH to encrypt tx details and give hints to open Pederson commitments, then if that ECDH is found, then it reveals amount information. What a QC needs to calculate the ECDH is both the enote ephemeral pubkey (which resides in the open on-chain) and the Monero address pubkeys. An adversary will always have the enote ephemeral pubkeys available to them due to the nature of blockchains, but the public address isn't necessarily available to them 22:24:27 There's some good discussion here: https://github.com/monero-project/research-lab/issues/106 22:29:38 Tevador proposed a one-shot, quantum forward secret scheme for sending funds where both sender and receiver know the secret spend key. It doesn't require interactivity, but payments can "bounce" and aren't confirmed until the receiver sends it back to themselves. At the end of the thread, I propose a interactive quantum forward secret scheme scheme which can't "bounce", doesn't re quire individual BPs, doesn't reveal to the sender when the payment is spent, and can be recovered by a deterministic Jamtis/Carrot wallet. The interactivity requirement might bar it from some use cases, though. But for any normal online retail-like payment, credit card or crypto, there is already some merchant service running which processes payments in real-time 22:30:42 Tevador's scheme would be have a similar flow to how current Monero addresses work, where you can consume an address and immediately construct a transaction to the receiver. However, it still needs an off-chain asynchronous channel like an email to work 22:32:40 Neither of these require any advanced post quantum cryptography to maintain unconditional confidentiality. Though, it should be noted that a QC could still inflate the supply 22:58:05 Amount commitments are already perfectly blinded, so long as the QC doesn't know your Monero address? 22:58:45 but as far as i had understoud it the private key of H is unknown 22:59:14 such that it is not known H = xG 22:59:28 where the x or gamma is unknown 22:59:50 and if found out then one could print monero at will? 23:02:36 if i recall correctly, C = aG + bH 23:02:50 where b is the amount and a is the blinding factor 23:04:16 so if i would send monero to myself knowing the rest of the info for the transaction, i could make a new Commitment for anouther amount? 23:06:12 so C = C' . but C' uses a different amount b? 23:07:28 (at least that how i put it into the ztm v2 in portuguese... 23:08:28 thats why i asked about that if there is this unknown discrete log wich cant be broken, say the private key of H. and if that is used merely for the amount commitments... 23:08:50 then if it was possible to do it "one time" amount commitments 23:32:51 well thanks for your reply jeffro256, i shall read on it further :)