UkoeHB / Seraphis

Privacy-focused tx protocol
52 stars 2 forks source link

Discussion: linking tag uniqueness #1

Open coinstudent2048 opened 2 years ago

UkoeHB commented 2 years ago

@coinstudent2048 Wrote a short proof that linking tags are uniquely defined by one-time addresses if the DL assumption is held.

coinstudent2048 commented 2 years ago

Regarding the "two DL breaks and two OTA breaks." I will delve into the formalism to see if this is allowed. While with hopium, I think Wikipedia says something like "if a successful attack is repeated a polynomial number of times, the success probability of the overall attack still remains negligible."

Source: https://en.wikipedia.org/wiki/Negligible_function#Use_in_cryptography

coinstudent2048 commented 2 years ago

Updated paper (same link): Yes, usage of two breaks (or any finite number, generally) is allowed :partying_face: (see Lemma 1.1).

UkoeHB commented 2 years ago

Sounds good, thanks! I will let this marinate for a couple weeks, then incorporate it into the paper.

Do you have a name/pseudonym and email address I can add to the author list?

coinstudent2048 commented 2 years ago

@UkoeHB Thanks! I am still contemplating if I'll give my real name, but for now, "coinstudent2048" (if this is allowed). Email: coinstudent2048@protonmail.com .

I will formalize the assumptions later on, but basically it says something like "the probability of attack success w.r.t security parameter λ, Prob(λ) is negligible (or equivalently, less than some negligible function negl(λ))."

I will study the Omniring paper, as suggested by Sarang. From the looks of it, it has several security models that can be used for analysis.

Probably, I'll also help in "academic" writing style, but just small edits.

EDIT: Even if the theorem turns out to not be useful, the technique is widely applicable. "X assumption easy => DL assumption easy" is more difficult (but not too much) and important than the other direction, which is actually trivial oftentimes.

coinstudent2048 commented 2 years ago

Updates (same link):

Very likely this would useful on other parts of Seraphis.

Sender-receiver anonymity (only in Section 4.3.1) is just DLP on K^'o - K^o base G (assuming t_c & t_k independent and randomly... uniform blablabla), so no need for proof.

Very likely there would be new theorems when I analyze the other parts. However, I will be busy in 2 weeks starting tomorrow (job-related) ;-; . I will still try to update if time allows.

For the TeX: https://github.com/coinstudent2048/writeups

coinstudent2048 commented 2 years ago

@UkoeHB I am sorry this can be confusing:

I think those two theorems (+ trivial ones above) complete the security analysis only for address and linking tag. Of course the addition of proof systems can affect the theorems. Now I will open another issue for outlining the analysis of Seraphis.

UkoeHB commented 2 years ago

@coinstudent2048 I started building C++ protocol mockups for benchmarking. My plan is to benchmark a wide range of protocols and test variables, so it will probably take me at least a couple weeks to finish coding and getting test results.

Once benchmarking is done, I will focus on completing the paper. The remaining parts are the efficiency section and security modeling/proving/etc. (which you have been working on - thanks!).

That is to say, the promised 2 weeks is being extended a bit...