Bitcoin Forum
May 06, 2024, 06:12:32 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 [257] 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 »
5121  Bitcoin / Development & Technical Discussion / Re: Ultimate blockchain compression w/ trust-free lite nodes on: July 30, 2012, 01:54:13 AM
The alt-chain mints blocks independently of the main-chain

An alt-"chain" is probably the wrong way to think of this.  It's committed data. There doesn't need to be a chain.  Each bitcoin block could have 0 or 1 tree commitments of a given type.
5122  Bitcoin / Development & Technical Discussion / Re: distributed escrow on: July 28, 2012, 09:15:42 PM
using shamir's secret sharing scheme ,
Which can't be used to implement escrows of the kind we usually talk about in Bitcoin— because it results in at least one (and potentially two) parties having complete control of the separated secret (the party who creates it, and the party who recovers it).

Perhaps you should start of by saying what you're trying to accomplish.
5123  Bitcoin / Development & Technical Discussion / Re: APPECoin, a system with total anonymization - key design points on: July 27, 2012, 08:34:51 PM
with so little information given by me,

This was basically my point.  You posted a lot of text, which I spent a fair amount of time reading— and I didn't get anything out of it because you didn't say much of anything. I didn't know if it was clear to you that you weren't saying anything concrete, so I used an example to illustrate the point.

Quote
In APPECoin,

Can I download APPECoin?

Quote
basically the miners take a set of tokens or bills, re-encrypts them, permute them, and publish them in the block. The permuted re-encrypted tokens are the new tokens that replace the originals. Each user can know for sure in with blocks his tokens are being shuffled (the token selection algorithm is deterministic and depends only on the block number). Also each user can try to decrypt each shuffled token and detect the new tokens that belong to himself.

I'm another miner and I have no transactions involved in the prior shuffle. How do I know know that the shuffle was valid?  Or, say I do have some transactions on the input side— and I see those are fine on the output, how do I validate that the shuffle didn't invalidly replace a bunch of transaction which weren't mine?  Is there a reason why I don't need to know?

I assumed you'd have a non-interactive zero-knoweldge proof for this, but I'm not aware of any which would be suitable.
5124  Bitcoin / Development & Technical Discussion / Re: APPECoin, a system with total anonymization - key design points on: July 27, 2012, 06:10:41 PM
have asked me how a peer to peer system with total anonymization may actually work.

Unfortunately you haven't answered this question here at all. Sad  This is a marketing speak arm-wave, not a design description.

I'm familiar with some of the re-encryption shuffles e.g. described for e-voting. I'm not aware of any way to get quite the properties you need.

Since you haven't described any details, I'm just going to pick the most insecure system which fits the description you've posted, a reasonable conservative assumption, and then I'll show that the strawman burns easily.

So— I say your proposal is that the miners produce N reencryption keys,  and make a random shuffle with each re-encryption key. The user can decrypt their own but not others. The non-interactive ZKP is created by the hash of the next block selecting which of the N published shuffles is the real one, then the miner must publish the N-1 reencryption keys for the other shuffles, and they must be valid shuffles or the prior block was invalid.

But this means that There is p=1/n chance of replacing all the transactions with your own at any block, or p=1 chance if you can mine two consecutive blocks.  This system fails.

Perhaps you didn't mean to propose something so trivially defeated, but I can't tell because you didn't describe it in more detail. Smiley

I'm not trying to be rude, but if you want the credit and attention of having disclosed something interesting you have to actually disclose something of interest— even just links to papers on algorithims which provide exactly the right properties and a sentence or two on how composing them gives you what your feature list describes. I'm sure lots of people would be interested in such a system, even if boring issues like space and time complexity make it not-practically-viable. Also, this thread probably belongs in the altcoin subthread.
5125  Bitcoin / Development & Technical Discussion / Re: Dynamic block frequency on: July 27, 2012, 07:17:46 AM
More frequent blocks will make forks longer, but I don't think there's a sense in which they can not converge.

A toy example: The block rate is infinitely fast, the communication delay between miners is 0+ε.  All miners are on their own forks and will never converge onto a single chain.   This was even demonstrated in practice on a altcoin.

Quote
That's the market of miners who don't wish their hashes to be wasted, and the market of users who prefer to minimize the probability of their transactions being double-spent.

The miners hases aren't "wasted", since eveyone takes the losses from orphaning. There is only the loss of security of blocks which are frequently below the communications horizon and the race to the bottom to include more transactions regardless of the overall security implications.

Quote
The market of users. Though this is a small enough problem that it can be solved by agreement rather than direct action.

There are many problems which are basically unsolvable in a dynamic system but are trivial when the parties can pre-commit. Bitcoin is defined by it's rules, its a pre-commitment that we've all signed up for. Changes that favor some over others would rightfully undermine any trust people put in it...

Quote
That's probably true. P2Pool emulates frequent blocks for variance purposes, and these days I have a different idea on how to make fast payments, so having a dynamic block frequency isn't critical.

... especially when there are alternatives.

5126  Economy / Scam Accusations / Re: Zhou Tong, You better pay me now... on: July 27, 2012, 05:56:31 AM
Not as great as pirates 28% monthly return but in my case
I would have guessed that someone experienced in financial markets would know you multiply compoundable returns, not sum them. I suppose not.
5127  Bitcoin / Development & Technical Discussion / Re: Dynamic block frequency on: July 27, 2012, 04:28:42 AM
I think you've missed the point. Block frequency has the effects that I described on Bitcoin users, nodes and miners.

On the contrary, you missed his.  The most important element of the inter-block time is the network convergence radius, if the interblock time is too small relative to the block validating and forwarding delay and the network is likely to never converge. Somewhat larger, but still small— a concentrated attacker gains an unusual advantage against distributed honest defenders, because the defenders lose hash power extending multiple separate forks due to slow convergence.  If you set the time just high enough to avoid the most fatal effects you still greatly increase the computational burden on full validating nodes, increase the storage burden on simplified nodes, and damage decentralization by discouraging validating or semi-validating nodes and driving people to centralized services.

It's not really an market parameter at all— and to the extent that it is one, it would be one highly prone to a race to the bottom which devalues the system for everyone.   Even if you set it to stupidly-low-will-break-for-sure levels there will intermittently be very long blocks. If you're engaging in activity where you need fast evidence of irreversibility it's almost always the case that you need consistently fast evidence of irreversibility— often fast, sometimes not isn't good.  So making the block times different doesn't really solve anything here.  Fortunately there are other ways to get evidence of irreversibility, lower variance for mining, etc. that don't require breaking the system.
5128  Economy / Scam Accusations / Re: Zhou Tong, You better pay me now... on: July 27, 2012, 12:40:05 AM
Better watch out,  it's not every day you get threatened by Aishwarya Rai for stealing 16,000 17,000 1,000,000,000BTC!
5129  Bitcoin / Development & Technical Discussion / Re: Node Address Sharing. The use of Time. on: July 26, 2012, 11:32:30 PM
with times over 10 minutes in the future to five days ago?

The reason it twiddles the time in various ways in various places is because the time is used to prioritize peer selection (in some limited ways), if peers could send you times in the far future they could unduly influence your peer selection.
5130  Economy / Service Discussion / Re: Satoshi Dice -- Statistical Analysis on: July 25, 2012, 06:43:21 PM
Here's another lucky martingale escape which accounts for the last spike up and back down on the blue line:

Make sure to chronically the flipside too. The failures, though sad, are also entertaining... and can serve as a cautionary tale for others.
5131  Bitcoin / Development & Technical Discussion / Re: Using sign feature: is there a risk in signing the address itself ? on: July 24, 2012, 08:12:36 PM
Let's say I have a bitcoin address B
It's corresponding private key is kB
Let's say I sign a message that contains B, such as "Hello, B is the address I just signed with its own key" with kB.
Does this action pose any risk beyond "it really looks weird" ?
Nope, it's safe, all signing is on a hash of the message, and its assumed that a malicious party may be supplying the strings you sign. Though why do you think it looks weird?
5132  Bitcoin / Development & Technical Discussion / Re: Blockchain size, exponential growth? on: July 23, 2012, 06:23:28 PM
That block size chart started from August 2011. BTC is created in 2009, and up to 2011 the block size did not grow over a couple of megabytes, so it was not a linear growth at all

Good thing I did not say linear growth then, I said there is a linear maximum. I have a laptop with enough storage for something like 20 years of growth at the maximum rate.  There are certainly things to be concerned about, like the loss of decentralization that comes from more people lazying out of the initial startup time... but there is no danger from "exponential growth" in terms of size.
5133  Bitcoin / Development & Technical Discussion / Re: Blockchain size, exponential growth? on: July 23, 2012, 11:18:07 AM
Generally predictions that begin with "I don't understand this BUT" are worthless.
It's NOT a prediction, just some thing is happening now. During the past year, it growed from couple of megabytes into couple of gigabytes, I have not factored that growth rate into my prediction yet:p
It's not a prediction, its not something happening, it's nonsense hysteria.  The blockchain size has a fairly modest linear maximum, which can not change without a hard fork of the protocol.  Can this stupid thread die now please?
5134  Bitcoin / Development & Technical Discussion / Re: BIP 34 : block height in the coinbase on: July 10, 2012, 09:03:18 PM
Including the height as part of the hash for the coinbase transaction is something Bitcoin should have always done. Although it should have been listed as the 'input' rather than putting it in the coinbase, but sadly the former can't be done compatibly.
But the coinbase is the input...

Well, another input.  I suppose you're right though.
5135  Bitcoin / Development & Technical Discussion / Re: BIP 34 : block height in the coinbase on: July 10, 2012, 08:55:21 PM
So this is to fix duplicate coinbase transactions potentially causing two coinbase transactions becoming invalid?

It makes the duplication ~impossible (save getting a hash collision). There was not previously a behavior where two coinbase transactions became invalid, rather one could replace another— though that is prevented by BIP30.

Quote
Why doesn't the client just identify transactions by a mixture of the transaction hash and the parent block

Because transaction exist externally to and independently of blocks. Even if you were willing to create software which only worked with confirmed transactions (e.g. not a full node) you'd still have crazy issues with transaction IDs changing when the chain reorginizes which could itself create some awesome exploits against merchant software.

Quote
(Hence removing the bug with no need for a hack)

Including the height as part of the hash for the coinbase transaction is something Bitcoin should have always done. Although it should have been listed as the 'input' rather than putting it in the coinbase, but sadly the former can't be done compatibly.

Quote
and why not get the majority of miners to reject blocks with duplicate coinbases to prevent a blockchain fork?

(As of BIP30) We reject duplication which would overwrite an existing unspent transaction, because that in and of itself creates some really nasty and critical attacks, but we can't explicitly prevent duplication of already spent transaction in the general case without making pruning impossible.  (If you have to remember every txn ID that ever was in order to refuse to mine duplicates you can't forget spent transactions).

Including the height in the coinbase implicitly prevents duplication by making it infesable but doesn't require unbounded storage like explicit prevention.  It also allows nodes software to be more DOS attack resistant because it would allow additional filtering prior to connecting. This is described in some of the links gavin provided.

BIP30 was an emergency fix for a severe vulnerability, deployed because the real fix couldn't be deployed quickly.  This change fixes the underlying protocol design flaw and fixes up some of the less critiial corner cases the other fix couldn't really address (e.g. the prospect of having to deal with duplicate transaction IDs for distinct transactions).
5136  Bitcoin / Development & Technical Discussion / Re: ~4 BTC Stuck In Wallet on: July 09, 2012, 02:18:53 AM
So, my client isn't able to get the block chain because of how I set my clock on my computer (I think it's crappy, but I don't care).

Just set your dang clock correctly. Get the time you want to display by picking the appropriate timezone.  So long as the time+timezone results in the correct time bitcoin will work fine. You can also set it back when you're done if you really insist on having a clock set >2 hours in the past.
5137  Bitcoin / Development & Technical Discussion / Re: P2PTradeX: P2P Trading between cryptocurrencies on: July 06, 2012, 09:46:05 PM
This contract will pay 100 XC from the prevout X to Bob's address if and only if a "proof" is published before 20 blocks from the publication of this contract.

Ah, I hadn't seen how you handled the non-completion case.  So in Bitcoin-style hashchains when that contract was mined it would consume the inputs forever unconditionally. If it did not, you could not have pruning.

Do you plan on breaking pruning or having the satisfaction rules change as a function of height or?
5138  Bitcoin / Development & Technical Discussion / Re: P2PTradeX: P2P Trading between cryptocurrencies on: July 06, 2012, 07:35:13 PM
The A->B transaction will timeout, and the money will return to A. Obviously adding a third party would prevent this, but the protocol must be TTF-free.

You can't create timeouts in Bitcoin, locktime sets the earliest valid time. So you pre-create the refunds... but yes because the timeout wouldn't be identical in both chains there is some exposure.

I don't see how you avoid extortion in your scheme that wouldn't just apply here.  E.g. you could do the pre-created refund tx only on one side in what I described... and have the other side be the send-hash-first side.  If they don't you perform the refund after the timeout, thus no race.

(Not that in general I think that using chain fragments is bad— but I think it's interesting in external oracles, and less in chains themselves)

Quote
2) With the scripting system, Alice could encrypt the value x so that it's difficult for Bob to manually find x from the transaction scriptSig. For example the scriptSig reference to x could be "r t + ~" so that x=~(r+t). Then the transaction would need special treatment to extract "x" and "y" in cleartext.

Both users would txouts before releasing a secret, so any funny business would have to be in the scriptsig.  If your scriptpubkey looks like if  H(stack) == 123456...  Then I could always copy from your scriptsig anything the satisfied that, even if it computed the value. Though yes, a program for this would have to have a pretty general solver to figure out how to extract the data.  So long as the abort transactions are sufficiently far out that shouldn't be a problem, and you'd have proof of your counterparty being evil.
5139  Bitcoin / Development & Technical Discussion / Re: P2PTradeX: P2P Trading between cryptocurrencies on: July 06, 2012, 02:31:53 AM
Could you clarify this:
Is "ABob_pub + H(x)==Ah + H(y)==Bh " the scriptPub ?

Are the values x and y provided by a scriptSig ?

Correct. The script sig would push the x and y values and the script pubkey would hash and compare them.

(You can also reduce the extortion risk  by using nlocktime, on specially constructed refund transactions. E.g. "Abob_pub + H()+H()" OR "Abob_pub2&&Aalice_pub" and have bob sign a refund txn with far future nlocktime using abob_pub2)
5140  Economy / Service Discussion / Re: Satoshi Dice -- Statistical Analysis on: July 06, 2012, 02:30:54 AM
How is it even possible that such a large population of independant events (those bets up to 4 and those above 4) can differ so heavily from the mean (0 level)? Shouldn`t they even themselves out?

I'm sure someone could give some figures on how often these results could be expected by chance.

Though since today seems to be the day for silly theories.

It was pointed out on IRC that you could do somewhat tidy laundering this way.


Identity X with dirty coins gambles until they lose Y coins.

Then using identity Y, they make more bets, and someone with knowledge of the MAC secret filters their candidate transactions  to help them win until they've won Y/2 (or whatever).

This would be pretty hard to distinguish, except for the weird effect would have on the odds, especially if they weren't careful about the distribution they drew the winning bets from... and it would be impossible to connect the parties beyond they were both participants at some point in the game.

It would also explain rapid, almost certainly bot-based, playing of a negative ev game, reasons for capping the total (make the distribution of bets more regular).  Plus elvis came down from a UFO and told me it was true.

Pages: « 1 ... 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 [257] 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!