Re: [Mimblewimble] Hashed switch commitments

2017-12-14 Thread Tim Ruffing
ivial currently as we know rJ from our wallet private keys > and we can quickly check if the switch commit hash was generated by > us. > > None of this is to say I disagree - just wanted to make sure these > were both visible as well. > > > — Antioch > > Sent with Pro

Re: [Mimblewimble] Hashed switch commitments

2017-12-13 Thread Antioch
om) Secure Email. > Original Message -------- > Subject: Re: [Mimblewimble] Hashed switch commitments > Local Time: December 13, 2017 11:18 AM > UTC Time: December 13, 2017 4:18 PM > From: cry...@timruffing.de > To: mimblewimble@lists.launchpad.net > > I need to resurrect this

Re: [Mimblewimble] Hashed switch commitments

2017-09-08 Thread Tim Ruffing
On Thu, 2017-09-07 at 18:12 +, Andrew Poelstra wrote: > It's true that people can put non-random things here which would be > really > bad for privacy. I don't think there's any efficiently-verifiable way > to > prevent that. Maybe requiring the data be a hash and requiring the > preimage > be

Re: [Mimblewimble] Hashed switch commitments

2017-09-07 Thread Oleg Andreev
Maybe store it committed to the excess factors (via merkle tree, to allow one excess to commit to multiple switch commitments)? Tx kernels are prunable, but committed to each block, so we can have a merkle proof of inclusion in a historical block to open the commitment. Raw excess commitment E

Re: [Mimblewimble] Hashed switch commitments

2017-09-07 Thread Andrew Poelstra
Hiding important data inside the rangeproofs would force nodes to keep it around. The rangeproofs are otherwise purely witness data that non-archival nodes can discard. On Thu, Sep 07, 2017 at 01:33:14PM -0700, Oleg Andreev wrote: > How about this (weird) idea: > > 1. Store `sha256(r*J)` inside

Re: [Mimblewimble] Hashed switch commitments

2017-09-07 Thread Oleg Andreev
How about this (weird) idea: 1. Store `sha256(r*J)` inside one of the first 2 forged elements (corresponding to the lowest bit of your number, assuming base-4 rangeproofs; for base-3 it also works). 2. When you reveal it after PQ upgrade, you will destroy 1 bit of privacy in your number,

Re: [Mimblewimble] Hashed switch commitments

2017-09-07 Thread Andrew Poelstra
On Thu, Sep 07, 2017 at 01:23:45PM -0400, Ignotus Peverell wrote: > Hi, > > I wanted to pick that back up. I think it comes down to yet another tradeoff > between privacy, security and convenience. To give back some context from > Andrew's email: > > > Basically our outputs should consist of