Pages:
Author

Topic: Zerovert - First Truly & Only Anonymous Coin with Zerocoin | Mandatory Upgrade ! - page 27. (Read 50921 times)

legendary
Activity: 2184
Merit: 1028
#mitandopelomundo
how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

That's the problem that we already have taken into account since project beginning. We have tried to use RSA-UFO [1], Secure
Multiparty Computations [2]. Finally, we decided to use RSA factor challenging [3] instead because, It is the best way to guarantee that we don't hold "p" and "q". Moreover, if you can crack, you can claim 200k with RSA Laboratories. In our plan, to prevent double spending, we can easily take a look global balance between Mint and Spend transactions. If you have spend transactions more than mint, which is impossible, we will know that they are double spending occur in the network.

[1] http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.4015
[2] https://daim.idi.ntnu.no/masteroppgaver/004/4699/masteroppgave.pdf
[3] http://en.wikipedia.org/wiki/RSA_Factoring_Challenge

not waste time giving explanations to these trolls and fudsters from shadowcoin, they will destroy your reputation, steal your ideas and try to launch before.
newbie
Activity: 42
Merit: 0

A quick trip to wikipedia shows that the zero cash protocol is better for bloat.

Why not claim you are using zero cash?


We implemented Zerocoin[1] not Zerocash[2].

[1] http://zerocoin.org/media/pdf/ZerocoinOakland.pdf
[2] http://zerocash-project.org/media/pdf/zerocash-oakland2014.pdf


how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

That's the problem that we already have taken into account since project beginning. We have tried to use RSA-UFO [1], Secure
Multiparty Computations [2]. Finally, we decided to use RSA factor challenging [3] instead because, It is the best way to guarantee that we don't hold "p" and "q". Moreover, if you can crack, you can claim 200k with RSA Laboratories. In our plan, to prevent double spending, we can easily take a look global balance between Mint and Spend transactions. If you have spend transactions more than mint, which is impossible, we will know that they are double spending occur in the network.

[1] http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.4015
[2] https://daim.idi.ntnu.no/masteroppgaver/004/4699/masteroppgave.pdf
[3] http://en.wikipedia.org/wiki/RSA_Factoring_Challenge

Thanks for the response.  Good luck with the launch.

Oh are you launching tomorrow with ZK enabled Tx's or is this something coming in the future?



We will launch with ZK enabled Tx's.
sr. member
Activity: 476
Merit: 250


I hold much more than SDC, As such you are calling out everycoin community who's coin i hold.

Nope only you and your SDC buddies that troll anything even remotely being a threat to SDC. You where at groud zero leaking chat rolls to start the Blocknet smear campaign proven to be planned by the huge bagholding SDC whales like Boh / pookielax31, TrollsRyoce / coolstoryteller and longnshort. Those are the guys and their shills I call out and will continue to do so every time I see you all fudding and trolling other coins and projects. It's easy to see just look at post histories on those guys.

 

no smear campaign has been proven, that is merely conjecture. But please continue on.

And can you clarify that you are in fact attacking me with your claims?
full member
Activity: 210
Merit: 100
Living the dream


I hold much more than SDC, As such you are calling out everycoin community who's coin i hold.

Nope only you and your SDC buddies that troll anything even remotely being a threat to SDC. You where at groud zero leaking chat rolls to start the Blocknet smear campaign proven to be planned by the huge bagholding SDC whales like Boh / pookielax31, TrollsRyoce / coolstoryteller and longnshort. Those are the guys and their shills I call out and will continue to do so every time I see you all fudding and trolling other coins and projects. It's easy to see just look at post histories on those guys.

 
sr. member
Activity: 476
Merit: 250
how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

That's the problem that we already have taken into account since project beginning. We have tried to use RSA-UFO [1], Secure
Multiparty Computations [2]. Finally, we decided to use RSA factor challenging [3] instead because, It is the best way to guarantee that we don't hold "p" and "q". Moreover, if you can crack, you can claim 200k with RSA Laboratories. In our plan, to prevent double spending, we can easily take a look global balance between Mint and Spend transactions. If you have spend transactions more than mint, which is impossible, we will know that they are double spending occur in the network.

[1] http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.4015
[2] https://daim.idi.ntnu.no/masteroppgaver/004/4699/masteroppgave.pdf
[3] http://en.wikipedia.org/wiki/RSA_Factoring_Challenge

Thanks for the response.  Good luck with the launch.

Oh are you launching tomorrow with ZK enabled Tx's or is this something coming in the future?

hero member
Activity: 742
Merit: 500

A quick trip to wikipedia shows that the zero cash protocol is better for bloat.

Why not claim you are using zero cash?
legendary
Activity: 1078
Merit: 1050
how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

https://github.com/Zerocoin/libzerocoin/wiki/Generating-Zerocoin-parameters

Man this sounds so hypocritical coming from someone who says they are making zk TX in testnet now.

Dev do a yourself a favor and read up on the Shadow coin trolls thread and even shadows own as you are about to get the fud hit storm of a life time you have never imagined. 

Buzz off kid, adults are talking again. Go research what you are implying its ridiculous! You are clearly quoting people who haven't the slightest clue what they're talking about. I can see that clearly because you haven't the fientest clue on how to string it all together properly! Give up trying you look stupid..Yet again!
newbie
Activity: 42
Merit: 0
how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

That's the problem that we already have taken into account since project beginning. We have tried to use RSA-UFO [1], Secure
Multiparty Computations [2]. Finally, we decided to use RSA factor challenging [3] instead because, It is the best way to guarantee that we don't hold "p" and "q". Moreover, if you can crack, you can claim 200k with RSA Laboratories. In our plan, to prevent double spending, we can easily take a look global balance between Mint and Spend transactions. If you have spend transactions more than mint, which is impossible, we will know that they are double spending occur in the network.

[1] http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.4015
[2] https://daim.idi.ntnu.no/masteroppgaver/004/4699/masteroppgave.pdf
[3] http://en.wikipedia.org/wiki/RSA_Factoring_Challenge
sr. member
Activity: 476
Merit: 250
how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

https://github.com/Zerocoin/libzerocoin/wiki/Generating-Zerocoin-parameters

Man this sounds so hypocritical coming from someone who says they are making zk TX in testnet now.

Dev do a yourself a favor and read up on the Shadow coin trolls thread and even shadows own ann (old non mod and new moderated ones) as you are about to get the fud shit storm of a life time you have never imagined.  

hypocritcal how? IT doesn;t use a zerocoin implementation. This has been stated numerous times. The reason it doesn't use Zerocoin implementation is because of the issues you mentioned in your post.
sr. member
Activity: 476
Merit: 250
how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Him and longnshort are known SDC trolls. Your coin claims to steal their holy grail. ZK-Snark implementation. Oddy When I bring up this same question they yelled fud and such. I am very sure though that he is referring quite rightly about 2 known ZK-Snark (ZeroCoin/Cash) issues. 1st a major one. How do you deal with the issue of trust? Simply how can you prove you deleted the key and supporting code that creates the coins? If you didn't and or made a copy you can mint as many coins as you damn well please. Huge 800lbs gorilla that. Now for the giant pink elephant in the same room. Blockchain bloat. Snarks bload as much if not worse than rig sigs. If this scaled up to say darkcoin in usage the network will come to a grinding halt. Zk-snarks use ten of thousands more bytes than a normal BTC TX. It's rare I agree with these guys but in this case they are right to ask these very serious questions.

I hold much more than SDC, As such you are calling out everycoin community who's coin i hold.
full member
Activity: 210
Merit: 100
Living the dream
how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

https://github.com/Zerocoin/libzerocoin/wiki/Generating-Zerocoin-parameters

Man this sounds so hypocritical coming from someone who says they are making zk TX in testnet now.

Dev do a yourself a favor and read up on the Shadow coin trolls thread and even shadows own ann (old non mod and new moderated ones) as you are about to get the fud shit storm of a life time you have never imagined.  
full member
Activity: 210
Merit: 100
Living the dream
how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Him and longnshort are known SDC trolls. Your coin claims to steal their holy grail. ZK-Snark implementation. Oddy When I bring up this same question they yelled fud and such. I am very sure though that he is referring quite rightly about 2 known ZK-Snark (ZeroCoin/Cash) issues. 1st a major one. How do you deal with the issue of trust? Simply how can you prove you deleted the key and supporting code that creates the coins? If you didn't and or made a copy you can mint as many coins as you damn well please. Huge 800lbs gorilla that. Now for the giant pink elephant in the same room. Blockchain bloat. Snarks bload as much if not worse than rig sigs. If this scaled up to say darkcoin in usage the network will come to a grinding halt. Zk-snarks use ten of thousands more bytes than a normal BTC TX. It's rare I agree with these guys but in this case they are right to ask these very serious questions.
newbie
Activity: 42
Merit: 0
IIRC... Vert used Parallax or Monocle as a testnet for stealth addresses, is this going to be a testbed for future implementation of ZK anon into Vert? if so awesome but I agree.. why not make it a standalone coin...
*edit the "why not make a different coin" is slightly answered above


Zerovert won't integrate with Vert in the future because Vertcoin direction is ASIC resistant, and protecting user's privacy with SX.
Zerovert will become a sidechain coin of Vertcoin in the future, and Zerovert direction is focusing on anonymity.
legendary
Activity: 1078
Merit: 1050
how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?

Zerocoin as currently implemented requires configuration with a trusted non-secret integer of 1,026 bits in length generated by multiplying together two factors p and q. That means you need a "trusted party" to configure Zerocoin; more importantly, if this trusted party decides to hold on to the p and q factors they used (rather than destroying them) or shares them with anybody, then they will be able to double spend any zerocoins. This is a fatal flaw if you wish Zerocoin to operate in a zero-trust manner. afaik

https://github.com/Zerocoin/libzerocoin/wiki/Generating-Zerocoin-parameters
newbie
Activity: 42
Merit: 0
how did you solve the zerocoin flaws?

Can you give us a specific flaw that you would like to know ?
HoY
newbie
Activity: 26
Merit: 0
Looking at the locked thread. Another Vert made by one of the original Vert devs?

Vert already has private transaction capabilities. Why not expand on that instead of new coin?

We wanted to come up with something new. The key innovation of Vertcoin was adaptive memory mining algorithm. For this coin, we wanted to stress the Zero-Knowledge privacy aspect of the cryptocurrency.


Adaptive memory mining algorithm? Are you still involved with VTC? because you know were changing algo's in a matter of weeks. You'll have an AUX-POW coin with nothing but Murray and Spain coin to mine it from.
sr. member
Activity: 336
Merit: 250
Looking at the locked thread. Another Vert made by one of the original Vert devs?

Vert already has private transaction capabilities. Why not expand on that instead of new coin?

We wanted to come up with something new. The key innovation of Vertcoin was adaptive memory mining algorithm. For this coin, we wanted to stress the Zero-Knowledge privacy aspect of the cryptocurrency.

just curious to why you not answering any of the real questions?
legendary
Activity: 1610
Merit: 1008
Forget-about-it
IIRC... Vert used Parallax or Monocle as a testnet for stealth addresses, is this going to be a testbed for future implementation of ZK anon into Vert? if so awesome but I agree.. why not make it a standalone coin...
*edit the "why not make a different coin" is slightly answered above
newbie
Activity: 42
Merit: 0
Looking at the locked thread. Another Vert made by one of the original Vert devs?

Vert already has private transaction capabilities. Why not expand on that instead of new coin?

We wanted to come up with something new. The key innovation of Vertcoin was adaptive memory mining algorithm. For this coin, we wanted to stress the Zero-Knowledge privacy aspect of the cryptocurrency.
Hox
sr. member
Activity: 762
Merit: 299
Sounds good, hopefully it will be open source from release, or at least have a solid roadmap to when it will be open source.
Pages:
Jump to: