Search content
Sort by

Showing 20 of 21 results by Mixles
Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 05/07/2015, 09:57:53 UTC
I'm not sure I'm following.  Based on the ratio of empty blocks to non-empty blocks, it looks like the mean time to process a block is 16 sec and 35 sec for F2Pool and AntPool, respectively.  Are you suggesting they're "faking it"?

You're assuming they are perfectly rational, and have remained perfectly rational during the measurement period for the ratio. If they were perfectly rational, they wouldn't have had orphans recently, because they would have anticipated the upgrade. The ratio tells you about their past strategies, which they might have tried and abandoned (or will abandon). If they were perfectly rational, there is no reason for the 16/35=45% difference in processing times (based on ratio), I would have thought that F2Pool has slower connectivity, so should be the other way around. If miners were perfectly rational, they would pay attention, in the same way, to the way empty blocks worry users. Data has much variation, and our estimates, by completely different methods, are actually surprisingly close (~10 sec handwaving, ~16 sec empirical), not necessarily contradictory.
Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 05/07/2015, 09:17:20 UTC
Thanks Mixles!  Do you have any thoughts on why F2Pool and AntPool are mining so many empty blocks if the previous block can be validated so quickly?

They gain a 600ms advantage on the verification, then another few seconds on the download, depending on their bandwidth. 600 seconds average in a block, so if they manage to get an advantage of 10 seconds, that's 10/600 or 2% greater profitability than other miners. There will be less incentive for that when the reward halvings happen (fees double relative to subsidy). *shrug* Maybe they are also making some political point, or simply can't be bothered dealing with the txns. But the recent orphans should have cost them a bit. They are playing their own sort of game theories, and not always winning.
Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 05/07/2015, 09:04:46 UTC
Great point.  Does anyone know how Bitcoin Core currently works in this regards?  Is every transaction in a block (re-) verified?  Or are the transactions first hashed, and if matched to a TX in mempool not re-verified, thus saving time.  

It would be stupid to forward unverified txns, and it would also be stupid to verify them twice. Easy to fix, so there's no reason for it to verify twice.

https://github.com/bitcoin/bitcoin/pull/5835

Thanks.  So it looks like the fix was implemented this February, and that now TXs are not re-verified if they're already in mempool?

Not sure if any solution is merged yet (see my edit above). But we are talking less than 600ms even without the extra speedup, or 10ms with the speedup.
Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 05/07/2015, 08:56:16 UTC
Great point.  Does anyone know how Bitcoin Core currently works in this regards?  Is every transaction in a block (re-) verified?  Or are the transactions first hashed, and if matched to a TX in mempool not re-verified, thus saving time.  

It would be stupid to forward unverified txns, and it would also be stupid to verify them twice. Easy to fix, so there's no reason for it to verify twice.

About 600 milliseconds to verify a 1MB block, will be reduced to about 10 ms

https://github.com/bitcoin/bitcoin/pull/6077

https://github.com/bitcoin/bitcoin/pull/5835
Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 05/07/2015, 08:52:01 UTC
I see no problem with SPV mining while verifying the previous block. It would also make my above suggestion pointless.

Yes.

Moreover, I don't see why the time spent verifying would be significant. The vast majority of transactions would have been verified by a full node before being included in the block, and then it is just a case of checking the hash, and looking up that the txn was previously mempool verified. The verification time for a block should be insignificant relative to its download time (unless it's a flood attack of new txns by a miner). Or am I missing something?
Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 04/07/2015, 00:07:09 UTC
Why are bondholders made whole from the funds of the depositors? The rules are there to be followed!



You didn't get the memo? For 7 years? Duude, are you for real?  Roll Eyes



Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 30/06/2015, 11:02:35 UTC
Édit: any feed-back tho? Im having doubts as to if i have done it right..

https://blog.bitmex.com/bitcoin-volatility-compression/

Post
Topic
Board Development & Technical Discussion
Re: [Crypto] Compact Confidential Transactions for Bitcoin
by
Mixles
on 27/06/2015, 07:42:05 UTC
1.  You wrote, "2To save space, SUM j=0 to outputs(∆j) is revealed as an unsigned integer at the transaction level.". Wouldn't such a sum allow some of the operands to be negative and others to be positive offseting. I presume you reveal the ∆ to prove the sum of the squares isn't negative, but appears that optimization in footnote 2 is flawed.

Yeah. Footnote removed.

2. There appears to be a typo of an extra superfluous (or missing redundant) parenthesis, "fuzzbits ≈ (curvebits − reservedbits)/2) − valuebits".

Removed.

3. It appears you avoided factoring fuzzValue into a sum of three squares by inventing a heuristic (to factor into a sum of two squares) to save "50% storage and computation requirements", but at the cost of reducing the security of the value blinding by 1/3 to 1/2 of the bits. Why is this a wise tradeoff?

Finding the actual 3 squares for a specific random integer can get too expensive at these bit levels. Some (maybe all) algorithms require factoring (or similar expense), and it is not convenient for a user to have to factor 252-bit numbers to generate a transaction output (regardless of a coin network's scalability). I will do more background reading to see if there is a better alternative.

Worse than that, even if 3 exact squares are found, one of the three square roots is likely to turn out to be very small (fewer than 32 bits). None of the roots are blinded for the proofs to work; they have to be the actual commitments. Then either the prover has to generate a new random number and run large-integer factoring again (and again...), or the attacker will know that one of the 3 committed values is cheap to break. Then the smallest square might as well be in plaintext and save the 50% overhead anyway. To solve that problem, [38] suggests using a probabilistic ECC system instead of a deterministic one, which doubles the cost of all commitments (though there are probably some new methods to push some of the cost back down), introduces the need for additional explicit equality proofs and other complexities.

How do you know this heuristic will terminate with less computational cost than factoring?

There's a good chance that the first random number will just work.

If not, all the heuristic does is: two square roots, two squares, one difference, one addition and two comparisons. Plain ultra-fast ops to repeat. Nothing like factoring, and much less work than one ECC multiplication.

4. As another consequence of discarding factoring, how do you know that providing one equation of one unknown will not reveal fuzzValue? Does that equation have provably many solutions?

It does have many solutions, as there are many more integers close (up to ∆) to sums of squares than there are integers that are actually sums of squares. There are also many more sums of squares than there are squares. Easy way to think about it is to set ∆=1, and see how sums of squares can work with it (4+9+1=14, 9+16+1=26, 4+16+1=21, 16+25+1=42, 4+25+1=30, ...), and that this is only bounded by the modulus of the system.

A proof of exactly how well [sum_of_two_squares, sum_of_two_squares + n] covers the integers would be good to include in the paper (it might also help to calibrate a better upper limit for ∆), but difficult to come up with.

5. Since the security of x2 is lowered by 1/3 bits, how do you know that finding this additional variable thus providing two equations with two unknowns will not catastrophically weaken the security due to some clever algorithm such as for solutions of systems of non-linear equations? Your cited resource [38] pointed out that the prior attempts to be clever to avoid factoring the sum of three (or four) squares lead to a solution that was attackable from both the hardness of the discrete logarithm and the hardness of integer factoring simultaneously, thus required higher bit widths to compensate which ameliorated the efficiency of the algorithm. Isn't the burden of proof on your whitepaper to explain why your cleverness has not introduced analogous vulnerability. I am just really doubting this attempt to avoid factoring to 3 squares. I would naively tend to trust the guy who wrote that cited resource [38] given the breath of knowledge and peer review that apparently went into it.

The goal in those sources is to provide proof for a very specific integer, they have no choice to opt out of the high level problem. For application in transactions with fuzz blinding, CCT is not constrained in that way, and can simply pick a different random number at the output level. This is actually what is done at low level in many NIZKP of small magnitude. It is done in the NIZKP of source [38] itself, in section 4.22.2, heading "ZK-proof of membership in a much-widened interval." If the random w doesn't work, the algorithm just tries another w until it succeeds. This does not necessarily weaken the system, although as you mentioned, the burden of proof is on the whitepaper. I think solving your point 4 is sufficient.

Also as per my response to point 3, in a deterministic ECC system, using the actual three squares can reveal the smallest one of them.
Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 25/06/2015, 22:20:35 UTC
Unbelievable!  It's almost as if subsidizing spam/noise transactions creates more of them.   Huh

Indeed, building wider motorways doesn't necessarily solve traffic congestion. A bunch of other things sometimes do (raising gasoline/car taxes/prices, regulation, unemployment, crime, alternative transport, virtual working, better city layout, emigration...).
Post
Topic
Board Development & Technical Discussion
Re: [Crypto] Compact Confidential Transactions for Bitcoin
by
Mixles
on 25/06/2015, 20:28:00 UTC
Unfortunately, Andrew Poelstra was able to break the cryptosystem for this scheme's range-proofs.  The author is working on fixing it, and I'm hopeful for progress there. This may take a bit of time, so if you're looking for something to test right now the CT feature in the Elements/Alpha is the best that is out there  at the moment.
Hi @gmaxwell, is Andrew Poelstra analysis publicly available somewhere?  Thanx.

The problem was with an invalid assumption that two curves of different orders would not be able to generate proof of same negative value, as long as the negative value is in the small range being proved. They clearly can, because "m = r + c*x" allows a negative x to leak into the negative cx and then offset against the positive random r, and the resulting m is then used for both curves.

That assumption is no longer present in the current version of paper (now with:.. diagrams!), but the resulting proofs are not as compact as initially hoped.
Post
Topic
Board Development & Technical Discussion
Re: [Crypto] Compact Confidential Transactions for Bitcoin
by
Mixles
on 17/06/2015, 23:23:38 UTC
Just as I'm getting over my migraine from learning about Confidential Transactions at a high level we get another awesome proposal. When I first saw your request for compensation on the CoinJoin thread I thought you were just another crank and/or weirdo (The jury is still out.). I would very much like to see a proof of concept.

To be honest, I think the muted response speaks for itself. This stuff turns out to be less important than I thought. Someone will eventually re-implement the same things from the paper (maybe Blockstream or Monero guys?). Multiple independent implementations are a good way to do crypto, because then they can be compared and tested against each other.

I thought that CT represented the entire value in the mantissa, so isn't this a distinction without a difference?

Inputs do not have an exponent.  The exponent is a property of the range proof, not of the values themselves. They work by scaling the basis the proof operates over.

I'm not 100% sure of the CT method, but it sounds like some information about the exponent is exposed to make the proofs shorter (you could keep it secret at a big cost). Maybe not the input magnitude, but the proof exponent range is public, and that selection, can itself give some information away. This is why CT is targeted at smaller 32-bit numbers.

Can CCT be used to encrypt other arbitrary information as well, or is it limited to transaction values?

Yes. There's a DH key exchange, which give a common secret through which you could share as much as you want.
Post
Topic
Board Development & Technical Discussion
Re: CoinJoin: Bitcoin privacy for the real world (someday!)
by
Mixles
on 17/06/2015, 02:36:34 UTC
It looks like you might need to write some code, as the post says "for completed work proposed in this thread that furthers the goal of making improved transaction privacy a practical reality for Bitcoin users."

Just as well that it does not say "for completed code". Otherwise I would be going against the thing. In a knowledge economy, new knowledge (and new code) takes a lot of completed works. Anyway, the review is not complete yet so my claim might not be valid. And even if it is valid or invalid logically, the fund is ultimately at the discretion of two individuals. If they want to encourage or discourage this kind of research is up to them.
Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 15/06/2015, 20:46:10 UTC
Great article explaining some profound details about ownership:

http://www.coindesk.com/bitcoin-ownership-impact-fungibility/

When you aquire a stolen article from a thief, you might be responsible, and have to give the article back to the rightful owner.

Not so with money, when you sell a can of beer to a known thief, nobody can claim the money from you. The reasoning behind it is to secure the fungibility of the money. When you receive money in a transaction, you should not worry about the source of that money. Exactly what we need for bitcoin, for the same reason.

Come to think of it, this is not so with the banks, they worry a lot where the money comes from, and I  have to declare by which acceptable means I have come to own them. Are deposit money not fungible? Strange world, indeed.

Nobody can claim the specific piece of paper money from you, solely on the basis that it was the very same piece of paper money that was stolen.

They (and others) can still make all sorts of other claims, for money or otherwise, like if you had reasonable cause to believe the paper money was proceeds from criminal activity, and accepted it anyway (see Shrem). The act of spending such knowingly dirty money to make it fungible, is called money laundering, I thought...
Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 14/06/2015, 21:09:57 UTC
The one good thing to have come out of Blockstream is the confidential values technique for blinding output amounts.

They hide only the mantissa part of the number and take 2.5KB to achieve that.

My confidential values technique hides the whole number in 0.4KB (subject to ongoing peer review, positive so far).

https://bitcointalk.org/index.php?topic=1085436.msg11597427#msg11597427

Can confidential values be implemented without a sidechain/directly on the mainchain?

Yes.
Post
Topic
Board Development & Technical Discussion
Re: CoinJoin: Bitcoin privacy for the real world (someday!)
by
Mixles
on 12/06/2015, 12:13:32 UTC
In order to further incentivize work in this space there is now a multisignature escrow bounty fund:

   3M8XGFBKwkf7miBzpkU3x2DoWwAVrD1mhk
                    (yes, Bitcoin addresses can also start with a 3)

This is a two-of-three multisignature escrow with myself, Theymos, and Pieter Wuille as signers. To release any coin sent to this address at least two of these people must sign the transaction.

The bounty fund will pay out as funds are available according to the signers best judgment for completed work proposed in this thread that furthers the goal of making improved transaction privacy a practical reality for Bitcoin users.

Please feel free to contribute to the above address to support work on this infrastructure.

I would like to make a claim on this fund for work done on Compact Confidential Transactions (subject to the ongoing peer review).

https://bitcointalk.org/index.php?topic=1085436.msg11597427

CoinJoin should 'just work' in this scheme, and has a similar interface to gmaxwell's Confidential Transactions for keeping participant's balances hidden from other participants.

Participants generate some random inputs, and same number of random outputs, to themselves with a zero sum, and ensure that they do not introduce any fuzz over/underflow, so the fee is fixed.

An alternative approach, is to let participants share only their fee delta, guaranteeing that everyone makes the same fee adjustment, in which case the number of outputs can also differ to the number of inputs for each participant.

If anyone puts in too much or too little, their sum, and the whole transaction sum, won't come out as zero and the transaction will be invalid.
Post
Topic
Board Development & Technical Discussion
Re: [Crypto] Sumcoin Whitepaper - Compact Confidential Transactions
by
Mixles
on 12/06/2015, 05:10:18 UTC
Is an implementation already available somewhere?

Nope.

Would be great to have it also implemented in some Proof-of-stake alt-coins like Peercoin.

Integrating Proof of Stake with the current design would likely require stake disclosure. Confidential Proof of Stake would require more proofs than in the paper.
Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 10/06/2015, 23:37:13 UTC
Cryptonote/Monero vs. Sumcoin/Blockstream's Confidential Transactions
Afaics, the anonymity does degenerate in a way that it doesn't in Cyptonote (Monero), which is conceptually relevant to my initial objection above regarding the fact that the recipients must be able to prove the amount they received (aka the Sumcoin viewkey).

...

The author doesn't state the holistic problem ... , that as values are revealed where the coin histories are not untraceable and unlinkable, then solving for other unknown values in the system

Thank you for your feedback.


I climbed down that theoretical physics rabbit hole and I am convinced there is nothing there. The entropy is limited by the number of opcodes in the hardware or software instruction set. It is not possible to spontaneously generate deterministic order of out disorder; and PoW requires a deterministic winner of each block. Order that arises from chaos was already there but under sampled (i.e. unobserved).

Attempt noted.

The author apparently thinks that users won't reveal their view keys in public.

The author (me) does not think that.

But does, apparently, attempt to publish pragmatic improvements in technology, without raising his expectations of others to the point of being discouraging.

As you do not publish your design, I can only respond with wild imagination. Your bearer coin might do well to hide values in its off-chain components; whether this specific technology may be useful for that, I do not know. I can imagine that the pure hash on-chain re-orgs are going to be possible and fun. Lamport signatures or much longer keylength for quantum computing. Of course, when people are Sybil nodes, and your spend is to an under-cover agent, and the courts shall accept the agent's circumstantial proof as sufficient and ignore the [lack of] math, ... oh what a world.
Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 09/06/2015, 15:41:57 UTC

I remember watching Adam Back's talk about this concept when he was in Israel at a meeting I think sponsored by Meni Rosenfeld.


Request for comments

http://voxelsoft.com/dev/sumcoin.pdf

CT and Anon MiniChain in one coin?  Impressive tech and elegant implementation!  Do want.   Cool

Any thoughts on which PoW is a good fit?  My favorite ATM is BBR's Wild Keccak (http://boolberry.com/files/Block_Chain_Based_Proof_of_Work.pdf).

I see Coloured Coins aren't compatible.  If implemented independently, are there more trade-offs with other trendy functions like CIYAM's AT, OP_RETURN, or CHECKLOCKTIMEVERIFY?  What about proof of stake?

If the Monero folk decide to put Sumcoin under their hood, would you help the core devs with integration?

Sumcoin is work/stake agnostic (stake may require disclosure), and does not break the core scripting language; so the opcodes remain possible.

It is early yet, want to get this out for review to the people who can - very possible I've made some mistakes.
Off-top-my-head, Monero seems like the easiest fit because it already has a view key, but I have not looked in detail.

Thanks for WK. Long term, it might be possible to auto-generate equivalent-difficulty hash functions. A new hash function for every block. That would fix things back down to FPGA technology level, and contribute better to generic hardware development.

Post
Topic
Board Development & Technical Discussion
Merits 1 from 1 user
Topic OP
[Crypto] Compact Confidential Transactions for Bitcoin
by
Mixles
on 09/06/2015, 13:49:24 UTC
⭐ Merited by ABCbits (1)
Post
Topic
Board Speculation
Re: Gold collapsing. Bitcoin UP.
by
Mixles
on 09/06/2015, 11:51:26 UTC

I remember watching Adam Back's talk about this concept when he was in Israel at a meeting I think sponsored by Meni Rosenfeld.


Request for comments

http://voxelsoft.com/dev/sumcoin.pdf