Bitcoin Forum
May 06, 2024, 09:55:47 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 [41] 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 »
  Print  
Author Topic: CryptoNote technical discussion and Chess Challenge  (Read 96044 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
boolberry (OP)
Sr. Member
****
Offline Offline

Activity: 378
Merit: 250


View Profile
January 18, 2016, 12:18:25 AM
 #801

Looks like we have different styles of play for this next move. With white I typically like control of the center with pawns and do not bring in majors too soon. The castle is an option that can wait for a defensive black move.

2 vote d5 (Morecoin Freeman,tifozi)
2 votes O-O (boolberry, LucyLovesCrypto)


3 votes d5 (Morecoin Freeman,tifozi, cryptoadoption15)
2 votes O-O (boolberry, LucyLovesCrypto)

You broke the tie with under 30 seconds to spare! I was just about to update the board with O-O as the winning move based on the tiebreaker rule previously cited. Anyway it is nice to see a new player join the chess game. Please join the CryptoNote discussion too.
1715032547
Hero Member
*
Offline Offline

Posts: 1715032547

View Profile Personal Message (Offline)

Ignore
1715032547
Reply with quote  #2

1715032547
Report to moderator
1715032547
Hero Member
*
Offline Offline

Posts: 1715032547

View Profile Personal Message (Offline)

Ignore
1715032547
Reply with quote  #2

1715032547
Report to moderator
Even if you use Bitcoin through Tor, the way transactions are handled by the network makes anonymity difficult to achieve. Do not expect your transactions to be anonymous unless you really know what you're doing.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715032547
Hero Member
*
Offline Offline

Posts: 1715032547

View Profile Personal Message (Offline)

Ignore
1715032547
Reply with quote  #2

1715032547
Report to moderator
1715032547
Hero Member
*
Offline Offline

Posts: 1715032547

View Profile Personal Message (Offline)

Ignore
1715032547
Reply with quote  #2

1715032547
Report to moderator
1715032547
Hero Member
*
Offline Offline

Posts: 1715032547

View Profile Personal Message (Offline)

Ignore
1715032547
Reply with quote  #2

1715032547
Report to moderator
8XMR
Member
**
Offline Offline

Activity: 88
Merit: 10


View Profile
January 18, 2016, 12:35:09 PM
Last edit: January 18, 2016, 01:14:53 PM by 8XMR
 #802

Nbd7

Yi Wei playing Magnus Carlson (for first time) right now. Go China!

http://www.tatasteelchess.com/live

8xmr.com
tifozi
Hero Member
*****
Offline Offline

Activity: 742
Merit: 501


View Profile
January 18, 2016, 01:23:41 PM
 #803

Nbd7

Yi Wei playing Magnus Carlson (for first time) right now. Go China!

http://www.tatasteelchess.com/live

Live video on livestream http://livestream.com/chess/tatasteelchess

GM Wei is 16 yrs old, seems to be doing well against Carlsen so far :tup:

I have a feeling @letsplayagame is in Wijk aan Zee too.  Cool
TPTB_need_war
Sr. Member
****
Offline Offline

Activity: 420
Merit: 257


View Profile
January 18, 2016, 04:30:10 PM
Last edit: January 18, 2016, 04:55:01 PM by TPTB_need_war
 #804

Not chess related but besides anonymity I think it is worth reminding people of another technical reason that makes CryptoNote coins much different than bitcoin.

CryptoNote uses the Schnorr signatures algorithm instead of Elliptic Curve Digital Signature Algorithm used by bitcoin

I think an elliptic curve discussion would be on topic if we have enough volunteers both willing and competent enough to discuss it.

https://en.wikipedia.org/wiki/Elliptic_curve_cryptography
https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm
https://en.bitcoin.it/wiki/Secp256k1
https://en.wikipedia.org/wiki/Schnorr_signature
https://en.wikipedia.org/wiki/Curve25519

This site offers some interesting comparisons although some of the conclusions (such as those on Secp256k1) may be controversial:
http://safecurves.cr.yp.to/

This should make bitcoin users feel better:

I believe that the ECC/NSA thread you referenced did eventually nail down every parameter used to create secp256k1 and answers most if not all concerns.
Yes, There is a python script that produces every parameter for secp256k1 from first principles, except the generator— and both myself and D. J. Bernstein have given the proof that in-advance choice of the generator is harmless outside of restricted conditions that aren't relevant to normal Bitcoin usage.

I have been asked in a PM if I would like to comment on this. I am not an expert and have no formal training in algebraic abstract math. Everything I know about this particular field (and cryptography in general) is self-taught mostly in 2014 and 2015. And I have big gaps in my understanding which can only be resolved by teaching myself the higher math courses I didn't take at the university and I don't have time for attaining that base knowledge. Nevertheless I can comment conceptually and understand enough to have for example combined Cryptonote with Compact Confidential Transactions to form what I named Zero Knowledge Transactions. And I understand enough to have digested Shen-noether's Ring Confidential white paper over a period of a day or few days. And I was able to analyze the differences and similarities and ramifications of the high level differences in our approach. So with that in mind, I will comment on the above quoted issue.

Afaik, the main difference between the Secp256k1 type of ECC that Bitcoin uses and the Ed25519 Berstein version of the twisted Edwards curve that Cryptonote uses, is that Ed25519 has no branching in the code and thus has no timing attacks (although one might reason that timing attacks might be less useful in crypto currency, I am not sure if that is true in all scenarios). And (perhaps more importantly) Ed25519 does not require a new random number on each subsequent signature, thus is deemed to less vulnerable to a faulty random number generator (or injection of virus thereof in the operating system). Also Ed25519 is moderately faster and has a prime order which is deemed to more secure (I don't remember if Secp256k1 has a prime order or not).

http://ed25519.cr.yp.to/

So Secp256k1 is probably secure but Ed25519 is more secure.

Please feel free to quote me and claim it as an advantage for Cryptonote coins, but please acknowledge that I have also criticized Cryptonote for not solving the fundamental block chain Tragedy of the Commons economic issues and my opinion that metadata correlation makes their anonymity impractical for any (or most?) mainstream uses.

newb4now
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500


View Profile
January 18, 2016, 05:20:18 PM
 #805

And (perhaps more importantly) Ed25519 does not require a new random number on each subsequent signature, thus is deemed to less vulnerable to a faulty random number generator (or injection of virus thereof in the operating system).

Is this advantage of Ed25519 over Secp256k1 negated assuming perfect compliance in avoiding BTC address reuse (since if a faulty RNG was used the balance of the at risk address would already be 0 after every transaction)?
newb4now
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500


View Profile
January 18, 2016, 05:24:27 PM
 #806

Nbd7

Yi Wei playing Magnus Carlson (for first time) right now. Go China!

http://www.tatasteelchess.com/live

Huge blunder in Mamedyarov vs Eljanov. How often does a GM lose a rook in 1 move (besides in a blitz game)?

Nbd7 (8XMR)
a5 (newb4now)
tifozi
Hero Member
*****
Offline Offline

Activity: 742
Merit: 501


View Profile
January 18, 2016, 05:27:51 PM
 #807

Nbd7

Yi Wei playing Magnus Carlson (for first time) right now. Go China!

http://www.tatasteelchess.com/live

Huge blunder in Mamedyarov vs Eljanov. How often does a GM lose a rook in 1 move?

Nbd7 (8XMR)
a5 (newb4now)

Yes it was sad to see Sad

Carlsen tortured Yi Wei before the draw (Wei played really well for what was a draw for a while and survived Carlsen's probes for a long time)

Best game was Navara vs Giri. Navara also errored according to the commentators and the guys on live chat.

This was the position when white(Navara) played Bd6 and black escaped (with Bxb2 41.Qxb2 Rxd6). Could be a puzzle as to what should have white done



TPTB_need_war
Sr. Member
****
Offline Offline

Activity: 420
Merit: 257


View Profile
January 18, 2016, 06:33:05 PM
Last edit: January 18, 2016, 06:48:17 PM by TPTB_need_war
 #808

And (perhaps more importantly) Ed25519 does not require a new random number on each subsequent signature, thus is deemed to less vulnerable to a faulty random number generator (or injection of virus thereof in the operating system).

Is this advantage of Ed25519 over Secp256k1 negated assuming perfect compliance in avoiding BTC address reuse (since if a faulty RNG was used the balance of the at risk address would already be 0 after every transaction)?

That perfect compliance is impossible isn't it, because how do you delete your public key from forums and other places it has been copied out-of-your-control. Don't tell me that the Bitcoin Wiki and the core devs never acknowledged this  Roll Eyes

There is a way though to get perfect compliance which I am using in my design because I use one-time Lamport/Winternitz signatures (although I could use Merkel trees for multiple signatures at the cost of a just marginally longer signature) for the 20 times faster verification speed (at the cost of an exponential blowup in bandwidth at higher bit security), but this way is not encoded in Bitcoin so can't be used there.

See the following I wrote comparing Ed25519 and hash-based signatures (some info on the performance of Ed25519 also):

https://github.com/shelby3/hashsig/blob/master/DDoS%20Defense%20Employing%20Public%20Key%20Cryptography.md#public-key-authentication

P.S. if you see any improvement in my work, it will be because of improving health. I have some signs that my high dose herbal treatments (curcumim, moringa, bitter melon, mangosteen) might be working. I believe possibly (unfortunately self-diagnosis no blood work nor doctor visit since the 2012 doctor screwed me up) my health issue is a messed up pancreas or gall bladder possibly partially blocking my bile duct which would explain why I got so ill every time after I eat.

You all have no idea what it is like to have this sort of illness. Even bending down to scratch your foot becomes chore. Lifting your fingers to type on the keyboard takes a few deep breaths to gain the energy. Thinking about code becomes a chore and not a pleasant challenge. You really don't understand until you walk in another person's shoes. Any person who knows what they were capable of throughout their life and are unable to do because of some painful and chronic disability, is going to exhibit psychological stress and will attempt to cope either by going into depression or fighting back, both being a form of abnormality and dysfunction. I hope that is enough said.

newb4now
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500


View Profile
January 18, 2016, 06:45:33 PM
 #809

Nbd7

Yi Wei playing Magnus Carlson (for first time) right now. Go China!

http://www.tatasteelchess.com/live

Huge blunder in Mamedyarov vs Eljanov. How often does a GM lose a rook in 1 move?

Nbd7 (8XMR)
a5 (newb4now)

Yes it was sad to see Sad

Carlsen tortured Yi Wei before the draw (Wei played really well for what was a draw for a while and survived Carlsen's probes for a long time)

Best game was Navara vs Giri. Navara also errored according to the commentators and the guys on live chat.

This was the position when white(Navara) played Bd6 and black escaped (with Bxb2 41.Qxb2 Rxd6). Could be a puzzle as to what should have white done





Giri is a great defender. I was rooting for Navara after he found that Rxf5 sacrifice.
newb4now
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500


View Profile
January 18, 2016, 06:49:36 PM
 #810

There is a way though to get perfect compliance which I am using in my design because I use one-time Lamport/Winternitz signatures

Forcing perfect compliance through cryptography sounds great. Unfortunately I cannot pretend to understand the math and cryptography behind everything you say except on a conceptual basis.
XMRpromotions
Sr. Member
****
Offline Offline

Activity: 336
Merit: 250


View Profile
January 18, 2016, 08:17:46 PM
 #811

Nbd7

Yi Wei playing Magnus Carlson (for first time) right now. Go China!

http://www.tatasteelchess.com/live

Huge blunder in Mamedyarov vs Eljanov. How often does a GM lose a rook in 1 move (besides in a blitz game)?

Nbd7 (8XMR)
a5 (newb4now)


Nbd7 (8XMR)
a5 (newb4now, XMRpromotions)

Don't buy Monero: https://twitter.com/MoneroPromotion/status/746006420508729344

XMR: 43hPTYyKarCTWyh4ZnMVn8AtFeEmtzTXo3Y6TGGMV26BWonJ4tpR7eP9RkUDYQbvg6LbrnMXWfghddE NGtvKxr7B5oML4qd
boolberry (OP)
Sr. Member
****
Offline Offline

Activity: 378
Merit: 250


View Profile
January 18, 2016, 08:57:34 PM
Last edit: January 18, 2016, 09:13:19 PM by boolberry
 #812

Not chess related but besides anonymity I think it is worth reminding people of another technical reason that makes CryptoNote coins much different than bitcoin.

CryptoNote uses the Schnorr signatures algorithm instead of Elliptic Curve Digital Signature Algorithm used by bitcoin

I think an elliptic curve discussion would be on topic if we have enough volunteers both willing and competent enough to discuss it.

https://en.wikipedia.org/wiki/Elliptic_curve_cryptography
https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm
https://en.bitcoin.it/wiki/Secp256k1
https://en.wikipedia.org/wiki/Schnorr_signature
https://en.wikipedia.org/wiki/Curve25519

This site offers some interesting comparisons although some of the conclusions (such as those on Secp256k1) may be controversial:
http://safecurves.cr.yp.to/

This should make bitcoin users feel better:

I believe that the ECC/NSA thread you referenced did eventually nail down every parameter used to create secp256k1 and answers most if not all concerns.
Yes, There is a python script that produces every parameter for secp256k1 from first principles, except the generator— and both myself and D. J. Bernstein have given the proof that in-advance choice of the generator is harmless outside of restricted conditions that aren't relevant to normal Bitcoin usage.

I have been asked in a PM if I would like to comment on this. I am not an expert and have no formal training in algebraic abstract math. Everything I know about this particular field (and cryptography in general) is self-taught mostly in 2014 and 2015. And I have big gaps in my understanding which can only be resolved by teaching myself the higher math courses I didn't take at the university and I don't have time for attaining that base knowledge. Nevertheless I can comment conceptually and understand enough to have for example combined Cryptonote with Compact Confidential Transactions to form what I named Zero Knowledge Transactions. And I understand enough to have digested Shen-noether's Ring Confidential white paper over a period of a day or few days. And I was able to analyze the differences and similarities and ramifications of the high level differences in our approach. So with that in mind, I will comment on the above quoted issue.

Afaik, the main difference between the Secp256k1 type of ECC that Bitcoin uses and the Ed25519 Berstein version of the twisted Edwards curve that Cryptonote uses, is that Ed25519 has no branching in the code and thus has no timing attacks (although one might reason that timing attacks might be less useful in crypto currency, I am not sure if that is true in all scenarios). And (perhaps more importantly) Ed25519 does not require a new random number on each subsequent signature, thus is deemed to less vulnerable to a faulty random number generator (or injection of virus thereof in the operating system). Also Ed25519 is moderately faster and has a prime order which is deemed to more secure (I don't remember if Secp256k1 has a prime order or not).

http://ed25519.cr.yp.to/

So Secp256k1 is probably secure but Ed25519 is more secure.

Please feel free to quote me and claim it as an advantage for Cryptonote coins, but please acknowledge that I have also criticized Cryptonote for not solving the fundamental block chain Tragedy of the Commons economic issues and my opinion that metadata correlation makes their anonymity impractical for any (or most?) mainstream uses.

Thank you for the Secp256k1 vs Ed25519 comparison. I see that ArticMine has been debating with you in the Monero thread about the Tragedy of the Commons issue. Based on my understanding he feels that the tail emission of CryptoNote coins (such as implemented by Monero) are critical to avoiding this and that coins like Boolberry eventually be vulnerable unless a tail emission is added. I agree with ArticMine that a tail emission would help Boolberry but still think we have plenty of time to decide how to implement it based on the BBR emission schedule.

Your objection seems to be centered around the assumption that mining will eventually become centralized (due to cost of electricity and other factors giving some parties a comparative advantage).  I look forward to seeing how future developments (such as smart mining being developed by Monero) and other changes impact decentralization.
TPTB_need_war
Sr. Member
****
Offline Offline

Activity: 420
Merit: 257


View Profile
January 18, 2016, 09:08:07 PM
Last edit: January 18, 2016, 09:47:38 PM by TPTB_need_war
 #813

There is a way though to get perfect compliance which I am using in my design because I use one-time Lamport/Winternitz signatures

Forcing perfect compliance through cryptography sounds great. Unfortunately I cannot pretend to understand the math and cryptography behind everything you say except on a conceptual basis.

It doesn't gain anything from an anonymity perspective (and is arguably retrogressive), if that is what you were thinking. We pay to a name instead of an address. The address can change and the name remains the same. For security it helps, and my greater motivation is eliminating lost payments (payments to addresses for which no one knows the private key) and overhead for microtransactions (and potentially IoT).

Edit: it is a usability feature for targeting the masses, and I think ShadowCoin has a similar feature but maybe not for the same motivations.

letsplayagame
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250


View Profile
January 18, 2016, 09:53:15 PM
 #814

Nbd7 (8XMR)
a5 (newb4now, XMRpromotions, letsplayagame)

Chess, Bitcoin, Privacy and Freedom
Code:
 Make BTC Donations via XMR.TO or Shapeshift XMR: 47nMGDMQxEB8CWpWT7QgBLDmTSxgjm9831dVeu24ebCeH8gNPG9RvZAYoPxW2JniKjeq5LXZafwdPWH7AmX2NVji3yYKy76 
boolberry (OP)
Sr. Member
****
Offline Offline

Activity: 378
Merit: 250


View Profile
January 19, 2016, 12:03:19 AM
 #815

Current position
Based on the votes in this thread Team Monero has chosen to play a5. Now it is time for Team Boolberry to respond. I will plan to count votes again tomorrow at approximately 0:00 UTC.

white to move


Team Boolberry (white pieces) vs. Team Monero (black pieces)
Game 2 PGN:
Code:
1.d4 Nf6 2.Nf3 g6 3.c4 Bg7 4.Nc3 O-O 5.e4 d6 6.Be2 e5 7.d5 a5
Morecoin Freeman
Hero Member
*****
Offline Offline

Activity: 854
Merit: 503


Legendary trader


View Profile
January 19, 2016, 03:40:04 AM
 #816

Giri is a great defender. I was rooting for Navara after he found that Rxf5 sacrifice.

♖ Spectacular Rook sacrifice indeed! Very interesting game.

Ask the stranger he knows who you really are.
tifozi
Hero Member
*****
Offline Offline

Activity: 742
Merit: 501


View Profile
January 19, 2016, 04:15:18 AM
 #817

Bg5 : 1 Vote (tifozi)
languagehasmeaning
Sr. Member
****
Offline Offline

Activity: 336
Merit: 250


View Profile
January 19, 2016, 04:29:21 AM
 #818

Bg5 : 1 Vote (tifozi)

Bg5 : 2 Votes (tifozi, languagehasmeaning)
Morecoin Freeman
Hero Member
*****
Offline Offline

Activity: 854
Merit: 503


Legendary trader


View Profile
January 19, 2016, 05:26:34 AM
 #819

Bg5 : 3 Votes (tifozi, languagehasmeaning, Morecoin Freeman)

Ask the stranger he knows who you really are.
tifozi
Hero Member
*****
Offline Offline

Activity: 742
Merit: 501


View Profile
January 19, 2016, 03:51:51 PM
 #820

Giri is a great defender. I was rooting for Navara after he found that Rxf5 sacrifice.

♖ Spectacular Rook sacrifice indeed! Very interesting game.

And today he was on the receiving end of a Rook sacrifice Smiley Brilliant brilliant match won by GM Yifan Hou. I am still stunned, the last 15+ moves were just amazing.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 [41] 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!