GijsWeterings / IdentityChain

GNU General Public License v3.0
6 stars 0 forks source link

Rangeproof leaks magnitude #13

Closed eanker closed 6 years ago

eanker commented 6 years ago

As the ING states:

The current version of this library implements the whitepaper “An Efficient Range Proof Scheme” by Kun Peng and Feng Bao. As discovered by Madars Virza, Research Scientist MIT Media Lab, this protocol contains a potential security vulnerability.

“The publicly computable value y/t is roughly the same magnitude (in expectation) as w^2 * (m-a+1)(b-m+1). However, w^2 has fixed bit length (again, in expectation) and thus for a fixed range, this value leaks the magnitude of the committed value.”

Therefore, the proof is not zero knowledge. We’re currently evaluating which protocol to use instead in order to provide a secure Zero Knowledge Proof protocol.

This is the same paper as we have implemented and thus we also leak the magnitude of w^2 * (m-a+1)(b-m+1)

LiamClark commented 6 years ago

In respect to the conversation with quinten can we close this?

eanker commented 6 years ago

Yes, this is out of scope for the project.