Author

Topic: Official Anoncoin chat thread (including history) - page 122. (Read 530660 times)

full member
Activity: 130
Merit: 100
Recently, I received 250 ANC from yoyo and a matching 250 ANC from TheKoziTwo, so this lets me work full time through October 18.  Since I am scheduled to start the testnet with Zerocoin on October 15 at the latest, this means I can work full time until the testnet launch and for 3 days after, to fix any problems that may appear. Thanks!!!

Anyway, I just wanted to clear up some confusion here about the RSA UFOs: users will be able to know that I do not have the complete factorization because the UFOs were produced by hashing with a cryptographically secure hash function (SHA-256, which is used everywhere in Bitcoin, Litecoin, Anoncoin, etc.). Small factors were found and removed in the UFO project. So the procedure to generate the complete RSA UFOs is 1) create the 13 "raw" UFOs by hashing, and 2) divide out the small factors found in the UFO project. This is performed not only by the UFO clients and server, but also will be performed on startup by all Anoncoin wallet software. The code is already there to do this.

Also, there is not one UFO, but 13 UFOs; to be valid, a coin must be accumulated in all of them. Using Monte Carlo simulations, I have found that there is a ~20% chance that any one of them can be factored by an extremely powerful attacker. This means that the probability of all 13 UFOs being factored by an extremely powerful attacker is about 1 in a billion -- and note that it would take factoring all of them to be able to forge zerocoins. My definition of "extremely powerful attacker" is one that can remove factors by the Elliptic Curve Method (ECM) up to 768 bits and can factor numbers up to 2048 bits using the Generalized Number Field Sieve (GNFS). This is far beyond what anybody is likely to be able to do for many decades.

Thanks for clearing all that up!
newbie
Activity: 1
Merit: 0
Can you ellaborate how you concluded the chance of factorization of a single UFO by an extremely powerful attacker is ~20%? To me a probability only makes sense if you take the variable time into account. How can a powerful attacker have a ~20% chance of factorization spending either 1 day or 1 year of computing power trying to factorize the number?

Okay, you're right. Pick any timespan you want, say, one year. A powerful attacker would be one that can find factors by ECM up to 768 bits and factor numbers up to 2048 bits by GNFS in one year. Such an attacker would then have a ~20% chance of factoring any one of those UFOs in that timespan. Assuming the capacity does not change, in 13 years, the attacker would have had a 1 in a billion chance of factoring all of them, because the attacker would have had enough time to be able to try all 13 in that time. Does that make sense?

Again, I should point out that this attacker would be far beyond what even the NSA is likely to be able to do for decades.

If in 10 years we are worried about someone breaking the all of the UFOs is it possible to upgrade the ZC implementation to use a new larger set of UFOs?

Yes, with a software upgrade (a hard fork). The new software would require that all newly minted zerocoins use the new UFO set. We give everyone, say, a one year deadline to mint all zerocoins in the old UFO set back into ANC (obviously it should be announced repeatedly, in as many places online as possible), and after that year, zerocoins can only be spent from the new UFO set.

Was going to stay out of this bickering but something is definitely rotten here.

A lot of anonymous coins are coming out.
Most of the newer ones are both 'trustless' and do not involve introducing new variables that could serve as back doors.

So many people here are trying to force others to trust Anoncoin and Zerocoin. I do not trust it. I do not trust the pushy people trying to confuse others with big words. It looks like a tag team wrestling show. A lot of fake arguments to sell tickets.

Some expert needs to look into this and find out what is going on. And by expert I don't mean the bs experts on this thread.
member
Activity: 101
Merit: 10
Can you ellaborate how you concluded the chance of factorization of a single UFO by an extremely powerful attacker is ~20%? To me a probability only makes sense if you take the variable time into account. How can a powerful attacker have a ~20% chance of factorization spending either 1 day or 1 year of computing power trying to factorize the number?

Okay, you're right. Pick any timespan you want, say, one year. A powerful attacker would be one that can find factors by ECM up to 768 bits and factor numbers up to 2048 bits by GNFS in one year. Such an attacker would then have a ~20% chance of factoring any one of those UFOs in that timespan. Assuming the capacity does not change, in 13 years, the attacker would have had a 1 in a billion chance of factoring all of them, because the attacker would have had enough time to be able to try all 13 in that time. Does that make sense?

Again, I should point out that this attacker would be far beyond what even the NSA is likely to be able to do for decades.

If in 10 years we are worried about someone breaking the all of the UFOs is it possible to upgrade the ZC implementation to use a new larger set of UFOs?

Yes, with a software upgrade (a hard fork). The new software would require that all newly minted zerocoins use the new UFO set. We give everyone, say, a one year deadline to mint all zerocoins in the old UFO set back into ANC (obviously it should be announced repeatedly, in as many places online as possible), and after that year, zerocoins can only be spent from the new UFO set.
sr. member
Activity: 336
Merit: 250
Recently, I received 250 ANC from yoyo and a matching 250 ANC from TheKoziTwo, so this lets me work full time through October 18.  Since I am scheduled to start the testnet with Zerocoin on October 15 at the latest, this means I can work full time until the testnet launch and for 3 days after, to fix any problems that may appear. Thanks!!!

Anyway, I just wanted to clear up some confusion here about the RSA UFOs: users will be able to know that I do not have the complete factorization because the UFOs were produced by hashing with a cryptographically secure hash function (SHA-256, which is used everywhere in Bitcoin, Litecoin, Anoncoin, etc.). Small factors were found and removed in the UFO project. So the procedure to generate the complete RSA UFOs is 1) create the 13 "raw" UFOs by hashing, and 2) divide out the small factors found in the UFO project. This is performed not only by the UFO clients and server, but also will be performed on startup by all Anoncoin wallet software. The code is already there to do this.

Also, there is not one UFO, but 13 UFOs; to be valid, a coin must be accumulated in all of them. Using Monte Carlo simulations, I have found that there is a ~20% chance that any one of them can be factored by an extremely powerful attacker. This means that the probability of all 13 UFOs being factored by an extremely powerful attacker is about 1 in a billion -- and note that it would take factoring all of them to be able to forge zerocoins. My definition of "extremely powerful attacker" is one that can remove factors by the Elliptic Curve Method (ECM) up to 768 bits and can factor numbers up to 2048 bits using the Generalized Number Field Sieve (GNFS). This is far beyond what anybody is likely to be able to do for many decades.

If in 10 years we are worried about someone breaking the all of the UFOs is it possible to upgrade the ZC implementation to use a new larger set of UFOs?
full member
Activity: 175
Merit: 100
Recently, I received 250 ANC from yoyo and a matching 250 ANC from TheKoziTwo, so this lets me work full time through October 18.  Since I am scheduled to start the testnet with Zerocoin on October 15 at the latest, this means I can work full time until the testnet launch and for 3 days after, to fix any problems that may appear. Thanks!!!

Anyway, I just wanted to clear up some confusion here about the RSA UFOs: users will be able to know that I do not have the complete factorization because the UFOs were produced by hashing with a cryptographically secure hash function (SHA-256, which is used everywhere in Bitcoin, Litecoin, Anoncoin, etc.). Small factors were found and removed in the UFO project. So the procedure to generate the complete RSA UFOs is 1) create the 13 "raw" UFOs by hashing, and 2) divide out the small factors found in the UFO project. This is performed not only by the UFO clients and server, but also will be performed on startup by all Anoncoin wallet software. The code is already there to do this.

Also, there is not one UFO, but 13 UFOs; to be valid, a coin must be accumulated in all of them. Using Monte Carlo simulations, I have found that there is a ~20% chance that any one of them can be factored by an extremely powerful attacker. This means that the probability of all 13 UFOs being factored by an extremely powerful attacker is about 1 in a billion -- and note that it would take factoring all of them to be able to forge zerocoins. My definition of "extremely powerful attacker" is one that can remove factors by the Elliptic Curve Method (ECM) up to 768 bits and can factor numbers up to 2048 bits using the Generalized Number Field Sieve (GNFS). This is far beyond what anybody is likely to be able to do for many decades.

Can you ellaborate how you concluded the chance of factorization of a single UFO by an extremely powerful attacker is ~20%? To me a probability only makes sense if you take the variable time into account. How can a powerful attacker have a ~20% chance of factorization spending either 1 day or 1 year of computing power trying to factorize the number?
member
Activity: 101
Merit: 10
Recently, I received 250 ANC from yoyo and a matching 250 ANC from TheKoziTwo, so this lets me work full time through October 18.  Since I am scheduled to start the testnet with Zerocoin on October 15 at the latest, this means I can work full time until the testnet launch and for 3 days after, to fix any problems that may appear. Thanks!!!

Anyway, I just wanted to clear up some confusion here about the RSA UFOs: users will be able to know that I do not have the complete factorization because the UFOs were produced by hashing with a cryptographically secure hash function (SHA-256, which is used everywhere in Bitcoin, Litecoin, Anoncoin, etc.). Small factors were found and removed in the UFO project. So the procedure to generate the complete RSA UFOs is 1) create the 13 "raw" UFOs by hashing, and 2) divide out the small factors found in the UFO project. This is performed not only by the UFO clients and server, but also will be performed on startup by all Anoncoin wallet software. The code is already there to do this.

Also, there is not one UFO, but 13 UFOs; to be valid, a coin must be accumulated in all of them. Using Monte Carlo simulations, I have found that there is a ~20% chance that any one of them can be factored by an extremely powerful attacker. This means that the probability of all 13 UFOs being factored by an extremely powerful attacker is about 1 in a billion -- and note that it would take factoring all of them to be able to forge zerocoins. My definition of "extremely powerful attacker" is one that can remove factors by the Elliptic Curve Method (ECM) up to 768 bits and can factor numbers up to 2048 bits using the Generalized Number Field Sieve (GNFS). This is far beyond what anybody is likely to be able to do for many decades.
full member
Activity: 206
Merit: 100
@Gnosis - wow quick response & sounded to me, like the right place to look too.

@AnonCoinTwitter - Ya agree, it's just difficult when more than 1/2 the posts are from those whom wish the project to fail.
member
Activity: 101
Merit: 10
Anoncoin Mining

Guys do you know good cloud mining services on which I can get some mining power on the Anoncoin network?
Remember this is scrypt.

Mintsy will offer this soon

https://mintsy.co
dont fall for cloud mining services, they are all scam and ripoff. no wonder craptsy now offer such a service too... its getting pathetic.
Yesterday , we had cryptsy developer in this forum. Please communicate with him to solve the cryptsy issue.

I agree fixing this issue with anc should be a priority. Nothing else needs to be done on cryptsys end. The issue seems to be getting sidelined.... Ill continue to merge inputs to reduce tx sizes until they get it resolved

Hi, it looks like none of us replied to you yet. Sorry about that.

So the problem is that some Cryptsy transactions are not being relayed, but they are valid if in a block, correct?

I can look at the transaction relaying logic in the Anoncoin code to see what exactly is responsible for this. Could you please give me a transaction that is relayed and a transaction that is not relayed (both hex-encoded)?
full member
Activity: 158
Merit: 100
I think it is fine to ask technical questions in this forum. However please be respectful of others whenever possible.

New potential investors will read this page (especially as we approach Zerocoin launch) and we want to give the best possible impression.

Many questions can already be answered by the Wiki page:
https://wiki.anoncoin.net/Anoncoin_Wiki
sr. member
Activity: 414
Merit: 251
Thank you for merging inputs.

Over what transaction size is there an issue? Is the size (in terms of # of ANC involved) at all relevant for the deposits or withdrawals getting stuck? Or is it purely a matter of transaction size?

Anoncoin Mining

Guys do you know good cloud mining services on which I can get some mining power on the Anoncoin network?
Remember this is scrypt.

Mintsy will offer this soon

https://mintsy.co
dont fall for cloud mining services, they are all scam and ripoff. no wonder craptsy now offer such a service too... its getting pathetic.
Yesterday , we had cryptsy developer in this forum. Please communicate with him to solve the cryptsy issue.

I agree fixing this issue with anc should be a priority. Nothing else needs to be done on cryptsys end. The issue seems to be getting sidelined.... Ill continue to merge inputs to reduce tx sizes until they get it resolved
sr. member
Activity: 336
Merit: 250
Anoncoin Mining

Guys do you know good cloud mining services on which I can get some mining power on the Anoncoin network?
Remember this is scrypt.

Mintsy will offer this soon

https://mintsy.co
dont fall for cloud mining services, they are all scam and ripoff. no wonder craptsy now offer such a service too... its getting pathetic.
Yesterday , we had cryptsy developer in this forum. Please communicate with him to solve the cryptsy issue.

I agree fixing this issue with anc should be a priority. Nothing else needs to be done on cryptsys end. The issue seems to be getting sidelined.... Ill continue to merge inputs to reduce tx sizes until they get it resolved

We still don't really know what's going on right?  Transactions are not being incorporated into blocks for some unknown reason?  Are you sure it's related to transaction size?  If so what is the largest txn you can make before it becomes an issue?
legendary
Activity: 1064
Merit: 1002
Anoncoin Mining

Guys do you know good cloud mining services on which I can get some mining power on the Anoncoin network?
Remember this is scrypt.

Mintsy will offer this soon

https://mintsy.co
dont fall for cloud mining services, they are all scam and ripoff. no wonder craptsy now offer such a service too... its getting pathetic.
Yesterday , we had cryptsy developer in this forum. Please communicate with him to solve the cryptsy issue.

I agree fixing this issue with anc should be a priority. Nothing else needs to be done on cryptsys end. The issue seems to be getting sidelined.... Ill continue to merge inputs to reduce tx sizes until they get it resolved
sr. member
Activity: 249
Merit: 250
No, you don't need to trust anyone. You can verify how the accumulator works before compiling your code if you like. (ignore back on.)

We will be able to verify how the accumulators works with the opensource code but the problem is no that.
The problem is that Gnosis will generate the keys (RSA) of these accumulators.
There is nothing trustless. You need to trust that Gnosis is honest and will not keep the factors to forge zerocoin proofs and then infinite ANC.
Source: https://wiki.anoncoin.net/Zerocoin#Zerocoin_in_practice (Section: Criticisms, fourth paragraph)

If gnosis has his own rsa ufos - with factors - then he had 8 core years squirrelled away in his basement ? get real !!! You cannot fake the numbers nor the work needed to work them out.

But, even if Gnosis had an alternative set of RSA UFOs, these wouldn't work with Zerocoin. The ZC mint transactions use the agreed upon value of N (the rsa ufo), and the spend transaction uses the same value of N. Miners verify that this is done correctly. There is no back door.


You turn around too. You try to invalidate my arguments trying to divert the issue.
As I said before, in the opensource code, it will be not possible to see if Gnosis hold the factors (P and Q) of the RSA keys or not. You will see only the N number in the opensource code.

According to the anoncoin wiki: https://wiki.anoncoin.net/Zerocoin#Zerocoin_in_practice (Section: Criticisms, fourth paragraph)
If Gnosis knows the factors, he will be able to forge zerocoin proofs and then infinite ANC. And there is no way to be sure he destroy these factors. You need to trust Gnosis.
Excuse me for being blunt, but you really don't know what you are talking about it. If N was chosen using Sanders method of generating RSA UFOs, there is no way that anyone could know the factorization of N. Since we are using Sander generated RSA UFOs for N, which are generated in a deterministic way, and since the number N can be verified in the code and by miners, there is no way that Gnosis could know its factorization, and there is no way that Gnosis could forge zerocoin proofs. This is what makes Zerocoin trustless.

What part don't you understand? I think that this is crystal clear.
legendary
Activity: 1736
Merit: 1001
After doing some researching on wiki this coin seems promising.
legendary
Activity: 1372
Merit: 1003
The source code and the data from the RSA UFO factorisation can be verified that they were correctly implemented in a trustless manner.  Once it's all been made opensource in the next few weeks.  So any arguments claiming it to be a scam are moot until then.
legendary
Activity: 1372
Merit: 1003
Building a hard to factor number without knowing its factorization - https://crypto.stackexchange.com/questions/9191/building-a-hard-to-factor-number-without-knowing-its-factorization

Efficient accumulators without trapdoor extended abstract - http://link.springer.com/chapter/10.1007%2F978-3-540-47942-0_21#page-1
sr. member
Activity: 249
Merit: 250
No, you don't need to trust anyone. You can verify how the accumulator works before compiling your code if you like. (ignore back on.)

We will be able to verify how the accumulators works with the opensource code but the problem is no that.
The problem is that Gnosis will generate the keys (RSA) of these accumulators.
There is nothing trustless. You need to trust that Gnosis is honest and will not keep the factors to forge zerocoin proofs and then infinite ANC.
Source: https://wiki.anoncoin.net/Zerocoin#Zerocoin_in_practice (Section: Criticisms, fourth paragraph)

If gnosis has his own rsa ufos - with factors - then he had 8 core years squirrelled away in his basement ? get real !!! You cannot fake the numbers nor the work needed to work them out.

But, even if Gnosis had an alternative set of RSA UFOs, these wouldn't work with Zerocoin. The ZC mint transactions use the agreed upon value of N (the rsa ufo), and the spend transaction uses the same value of N. Miners verify that this is done correctly. There is no back door.
hero member
Activity: 527
Merit: 500


The fourth paragraph clearly states that the original Zerocoin approach has the flaw you thinking of. However in the last sentence it says that Anoncoin will use RSA_UFOs and generate them by using Sanders 1999.

Can you even read?

EDIT:
Of course you have to trust Gnosis that the coding is correct. But you need to trust any other developers as well when you use any program on this world. Like I said before, If you don't trust anybody you will live in a box.

EDIT2: Other people don't need that trust, they read the opensource code


he live in a box   , with 40W panel  

https://bitcointalksearch.org/topic/official-anoncoin-chat-thread-including-history-227287
sr. member
Activity: 298
Merit: 250
EDIT:
Of course you have to trust Gnosis that the coding is correct. But you need to trust any other developers as well when you use any program on this world. Like I said before, If you don't trust anybody you will live in a box.

EDIT2: Other people don't need that trust, they read the opensource code

Thanks to agree with me. Finally you understand that you need to trust Gnosis.
As I said before, in the opensource code, it will be not possible to see if Gnosis hold the factors (P and Q) of the RSA keys or not. You will see only the N number in the opensource code.


I didn't agree with you and that.
I said you need to trust Gnosis that the source code is legit when you can't read it.

It's a different thing.

Yes, we need to know if Gnosis holds the factors (or if he is able to) - you are right by saying that this would be a major major threat.
But you need to understand that by generating by hashing the only way to know the complete factorization is to factorize it.

EDIT: If you don't understand it, and you feel there is too few sources to explain it to you, PM Gnosis. This is getting ridiculous really, you make too much of a fuzz because you have a lack of understanding it, it even seems like you don't want to. So like I said, PM Gnosis or read into the source, that's important for you.
sr. member
Activity: 298
Merit: 250
No, you don't need to trust anyone. You can verify how the accumulator works before compiling your code if you like. (ignore back on.)

We will be able to verify how the accumulators works with the opensource code but the problem is no that.
The problem is that Gnosis will generate the keys (RSA) of these accumulators. Even if he use RSA-UFO to generate them, he have the control of all the generation operation.
There is nothing trustless. You need to trust that Gnosis is honest and will not keep the factors to forge zerocoin proofs and then infinite ANC.
Source: https://wiki.anoncoin.net/Zerocoin#Zerocoin_in_practice (Section: Criticisms, fourth paragraph)

The fourth paragraph clearly states that the original Zerocoin approach has the flaw you thinking of. However in the last sentence it says that Anoncoin will use RSA_UFOs and generate them by using Sanders 1999.

Can you even read?

EDIT:
Of course you have to trust Gnosis that the coding is correct. But you need to trust any other developers as well when you use any program on this world. Like I said before, If you don't trust anybody you will live in a box.

Ok if you are too ... (I'll be polite) to understand I ask you:
1) Who will use RSA-UFOs to generate these keys?

Reponse is Gnosis.

2) Then if Gnosis will use RSA-UFOs to generate the keys of accumulators. Where is the trustless setup? You need to trust that Gnosis is honest and will not keep the factors for him to forge zerocoin proofs and then infinite ANC.

1 - We used the source code to do so.
2 - He used "hashing"
Jump to: