Search content
Sort by

Showing 3 of 3 results by seigen
Post
Topic
Board Altcoin Discussion
Re: Monero vs Boolberry Chess Challenge and CryptoNote technical discussion
by
seigen
on 01/10/2015, 13:26:54 UTC
My single biggest question after reading the entire paper is the how did they choose their elliptic curve constants?  The protocol appears sound; who chose the constants?  Will there be a plan for choosing new constants in the future if needed?

As I understand it the constants were chosen by Daniel J. Bernstein. I think this is noted in the white paper but may have been missed during that initial review when cryptonote suddenly dropped out of the sky.

https://en.wikipedia.org/wiki/EdDSA

I'm not a cryptographer so I may be getting some of this wrong.

Quote
I know that Monero and Boolberry did not create CryptoNote but have improved on it. Any guesses for the reason the CryptoNote creators selected a relatively new cryptographic hash function?
https://en.wikipedia.org/wiki/Secure_Hash_Algorithm

I've not seen any answer to this, though you could try asking on their forum. That can be hit or miss. Some of the people posting there on behalf of "cryptonote" obviously have technical knowledge but others are just clueless.



Daniel Bernstein seems well qualified to make that decision. Maybe he will share his thoughts with us. Is he on bitcointalk?
https://en.wikipedia.org/wiki/Daniel_J._Bernstein

The second question may or may not even matter (I have no reason to assume there is something wrong with the chosen hash function).  Only because of the importance of the decision am I wondering about the selection.  I have not registered on the CryptoNote forums but may do so at some point.

Thank you for your time.


1. The largest prime number closest to the power of two (2^255 – 19) was defined for modular arithmetics speed up. 
2. The order of group 1 (another large number) was obtained when the group order for this curve was calculated.
3. Basepoint for EdDSA corresponds to the basepoint of Curve25519. These curves are birationally equivalent. Curve25519  uses the base point x = 9
4. Coefficient 486662 for Curve25519 (and, respectively, coefficient 121665 for EdDSA) was chosen the same way.

More detailed explanation of each constant choice can be found there: http://cr.yp.to/ecdh/curve25519-20060209.pdf


Post
Topic
Board Announcements (Altcoins)
Re: [BCN] Bytecoin. Secure, private, untraceable since 2012
by
seigen
on 21/07/2015, 10:16:31 UTC
update: improvements anything to do with this? http://www.texpaste.com/n/xaypn9ni
I've asked seigen to have a look to have a valid answer on this one.

The proposal by Adam Back does reduce the size of ring signature. In case of large ringsig it maybe roughly two times smaller. However, from asymptotic point of view there is no difference from CryptoNote implementation: it is still a linear dependence O(n).
Post
Topic
Board Altcoin Discussion
Re: [BCN] Bytecoin technical discussion
by
seigen
on 10/09/2014, 10:38:07 UTC
I'm hopeful that some of the thoughtful development that's occurred with BCN already may find its way into BTC.  Indications are that BCN has not gone unnoticed by the bitcoin development community ~ for those who haven't already,  see:
Output Distribution Obfuscation, by Gregory Maxwell and Andrew Poelstra (a July 16, 2014 post). (Involves use of cryptonote-based bytecoin (BCN) ring signatures, described as a possibility for bitcoin.)
http://download.wpsoftware.net/bitcoin/wizardry/brs-arbitrary-output-sizes.txt


First of all, I must admit that their idea is worth looking into. However, I'm not sure whether the problem it is trying to solve is relevant when everyone uses the software that uses the protocol properly. BCN automatically splits outputs into standard sums (e.g. 136.7 -> 100+30+6+0.7), so there are plenty of outputs for any ring signature. And if someone forms a transaction manually thereby creating a non-standard output (without splitting) the outcome of such an action is his sole responsibility.
 
To praise inventors’ acumen, the scheme they offer does work. It allows to use a single output (amount=V) in different ring signatures with any amount less than V. Namely for every n-value there are floor(V/n) outs of amount "n" and one out of amount "V%n". Receiver is able to recover all private keys for some specific "n", while others can use every possible out public key (for any n-value) in their ring signatures. So that any output can be used in any ring signatures with lesser amount. I won't duplicate the math; it can be found in the paper.
 
Unfortunately, there are a few drawbacks to the scheme offered.
 
1) Outputs. BCN has 10-13 outputs per transaction, including the change outs. That's why it is a challenging task to determine the exact amount of an actual transfer and the change. By reducing the number of outputs to 1-3 we lose out on anonymity, just as it is implemented in BTC.
 
2) "Real"/"ghost" outputs bias. A recipient is tied to a specific n-value (chosen by the sender). When he will have spent all "real" outputs for key P, there will be floor (V/n) outs of amount "n" and one out of amount "V%n". Other users are likely to utilize different n-values and choose them randomly. When analyzing the blockchain i.e. looking for every possible spending of the P-output, a researcher will see a bias in specific n-values. Moreover, it is very likely that a researcher will find that all these "n"-transactions have sum of V – which in turn reveals the outs as "real".
 
3) Shared n-value. Let's leave aside a method of transferring this value to a receiver (the paper does not describe it, implying that the both parties know it). Even if the distribution of n-values is nearly uniform, the sender has an opportunity to trace the subsequent transactions by monitoring all possible spending with "n" value he knows. The additional rule that condradicts the anonymity: i-values should be different when the "real" outputs are spent.
 
The bottom line is: although the scheme offers smaller transaction size and larger amount of possible outputs it cripples the anonymity feature. All things considered it is not a good trade-off.