Code Monkey home page Code Monkey logo

Comments (4)

seresistvanandras avatar seresistvanandras commented on August 16, 2024

Yes, indeed, you're right! This is a bug in the paper! Thanks for pointing it out. However, I'm not sure about whether your suggested fix would work. The statement does not bind the prover to the attributes of the credentials being requested, namely , for .

I think the only adjustment we need to make is to change the right hand side of the verification equation to . So essentially, our statement is a knowledge of representation of the point (left hand side of the verification equation), with respect to generators . This ensures that indeed the client is the one who rerandomized the credentials (knows the sum of the randomizing scalars) and the summation of the amount attributes also match.

from wabisabi.

onvej-sl avatar onvej-sl commented on August 16, 2024

I think I did a stupid mistake: in the section "Over-spending prevention by balance proof" has nothing to do with the from the section "Unconditional Hiding". Now it does make sense to me, since:

So it's a bit misleading but correct.

from wabisabi.

nothingmuch avatar nothingmuch commented on August 16, 2024

thanks for this, it's a good feeling knowing that you are because of all of what you found in Wasabi already!

i will try and think of a way to improve this notation, the r' vs. r in the balance proof is kind of confusing even without an additional unrelated r', but it's the best i could come up with. maybe just a note in the perfect hiding section saying that although that is possible the rest of the document omits those terms are not added for simplicity so that at least there is only one r'.

FWIW right now for the proof of concept we are not implementing unconditional hiding, but i insisted on keeping that in the paper because i think it's attractive from a coercion point of view, there would be no point in e.g. coercing the coordinator give up records or something to a nation level attacker who may become a post quantum adversary eventually thereby gaining the ability to retroactively deanonymize users).

if we end up using bulletproofs or compressed sigma protocols then i believe this would only be needed for the serial number, because the proofs are only p-special sound due to the compression, and it would be logical to collapse an entire request into a single batch proof in that case for communication efficiency anyway

from wabisabi.

nothingmuch avatar nothingmuch commented on August 16, 2024

see also #46 and #40 (second time this confusion has happened, although back then it was way worse because i didn't even put a ' on the vars ;-)

from wabisabi.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.