Watson Ladd [ARCHIVE] on Nostr: š
Original date posted:2012-03-21 š Original message:On Wed, Mar 21, 2012 at ...
š
Original date posted:2012-03-21
š Original message:On Wed, Mar 21, 2012 at 3:54 PM, Gregory Maxwell <gmaxwell at gmail.com> wrote:
> On Fri, Mar 2, 2012 at 2:57 PM, Watson Ladd <wbl at uchicago.edu> wrote:
>> Dear all,
>> I am proposing a new opcode for the purposes of anonymous
>> transactions. This new opcode enables scripts to be given proof that
>> the receiver can carry out or has carried out a previous transaction.
>> I'm currently working on a paper that discusses using this opcode for
>> anonymous transactions.
>
>
> Here is an alternative protocol:
>
>
> N parties wish to purchase equal amounts of Bitcoin without the
> exchange being able to link their future transactions, they each put
> the relevant amount of gold/whatever up at the exchange.
>
> The exchange provides the exchanges public key, and the user provides
> a public key for signing. Ā Externally the N participants agree on a
> collection of non-cooperating mixers (the mixers may actually just be
> the participants themselves, independent third parties, etc). Ā Each
> participant generates a new bitcoin address, and encrypts it with the
> the public keys of the the exchange and all the mixers using an
> appropriate communicative homorophic scheme (or just a layers stack of
> regular encryption keys). Ā The participants then combine their
> encrypted addresess into a block and hand it off to the mixing chain.
> Each mixer randomizes the order and decrypts all the messages with its
> key.
>
> At the end of the chain the exchange does the final decryption and
> presents a list of addresses to the involved users. Ā Users validate
> that their address is in the set and sign the entire set. Ā Once all
> involved users have signed, the exchange pays.
>
>
> This requires no changes to the Bitcoin system and could be trivially
> implemented by anyone interested. Ā It provides anonymity which is
> strong so long as any one of the mixers is uncompromised. Ā It has very
> low overhead. Ā It is not directly resistant to disruption, but if
> participation in an identified round requires a key provided by the
> exchange, abusive users can be detected and excluded.
>
> Have I explained this clearly enough? I could probably implement the
> whole system it if its unclear.
>
> Can you contrast this with your proposal for me?
Contrasts
-My protocol works, your's doesn't. It's not enough to have a mix, the
mix needs to be verifiable to avoid
one of the mixers inserting their own key and removing a key that
should be in there. That doesn't mean you can't make your protocol
work with some more magic, but magic is required.
-You need a lot of online computation: the recipients need to be
involved with validating the mix. By contrast in mine you need to wait for
enough people to get their bitcoins to avoid partitioning. But this
might be a strength,
not a weakness.
-You avoid the problem of de-anonymizing through having the protocol
run incompletely: if the permutation is correctly computed the
transaction goes through.
-You also avoid all the problems with modifications to the bitcoin
clients and miners.
It's definitely a good alternative, once you fix the problem in 1.
On a related note, private keys and signatures have better proofs of
knowledge then hashes. Has this been considered in the P2SH
conversation? There might be ways to use this to make even better
methods for enhancing anonymity.
Sincerely,
Watson Ladd
--
"Those who would give up Essential Liberty to purchase a little
Temporary Safety deserve neitherĀ Liberty nor Safety."
-- Benjamin Franklin
--
"Those who would give up Essential Liberty to purchase a little
Temporary Safety deserve neitherĀ Liberty nor Safety."
-- Benjamin Franklin
Published at
2023-06-07 03:11:38Event JSON
{
"id": "e7ab8a2c0cf5952af56125809a748bf08159adcd631234440cebe159e2f9e139",
"pubkey": "79da9465d0e005bd619ff8b66831e69cf4518e5322281ec55df2bd63966dbc4c",
"created_at": 1686107498,
"kind": 1,
"tags": [
[
"e",
"5a857429232c8a36bb1e76148eeb2509b7c891458a6ae01c53d1cdd23f34dde1",
"",
"root"
],
[
"e",
"dd4bb4a8e53b69dc6e65cc88f02141ca4c6596bdfc00a86c55694ac8c2b36d13",
"",
"reply"
],
[
"p",
"a277336e95d2d0a831fff67fc80d8082322689a88ede9f877fa246a02629a43f"
]
],
"content": "š
Original date posted:2012-03-21\nš Original message:On Wed, Mar 21, 2012 at 3:54 PM, Gregory Maxwell \u003cgmaxwell at gmail.com\u003e wrote:\n\u003e On Fri, Mar 2, 2012 at 2:57 PM, Watson Ladd \u003cwbl at uchicago.edu\u003e wrote:\n\u003e\u003e Dear all,\n\u003e\u003e I am proposing a new opcode for the purposes of anonymous\n\u003e\u003e transactions. This new opcode enables scripts to be given proof that\n\u003e\u003e the receiver can carry out or has carried out a previous transaction.\n\u003e\u003e I'm currently working on a paper that discusses using this opcode for\n\u003e\u003e anonymous transactions.\n\u003e\n\u003e\n\u003e Here is an alternative protocol:\n\u003e\n\u003e\n\u003e N parties wish to purchase equal amounts of Bitcoin without the\n\u003e exchange being able to link their future transactions, they each put\n\u003e the relevant amount of gold/whatever up at the exchange.\n\u003e\n\u003e The exchange provides the exchanges public key, and the user provides\n\u003e a public key for signing. Ā Externally the N participants agree on a\n\u003e collection of non-cooperating mixers (the mixers may actually just be\n\u003e the participants themselves, independent third parties, etc). Ā Each\n\u003e participant generates a new bitcoin address, and encrypts it with the\n\u003e the public keys of the the exchange and all the mixers using an\n\u003e appropriate communicative homorophic scheme (or just a layers stack of\n\u003e regular encryption keys). Ā The participants then combine their\n\u003e encrypted addresess into a block and hand it off to the mixing chain.\n\u003e Each mixer randomizes the order and decrypts all the messages with its\n\u003e key.\n\u003e\n\u003e At the end of the chain the exchange does the final decryption and\n\u003e presents a list of addresses to the involved users. Ā Users validate\n\u003e that their address is in the set and sign the entire set. Ā Once all\n\u003e involved users have signed, the exchange pays.\n\u003e\n\u003e\n\u003e This requires no changes to the Bitcoin system and could be trivially\n\u003e implemented by anyone interested. Ā It provides anonymity which is\n\u003e strong so long as any one of the mixers is uncompromised. Ā It has very\n\u003e low overhead. Ā It is not directly resistant to disruption, but if\n\u003e participation in an identified round requires a key provided by the\n\u003e exchange, abusive users can be detected and excluded.\n\u003e\n\u003e Have I explained this clearly enough? I could probably implement the\n\u003e whole system it if its unclear.\n\u003e\n\u003e Can you contrast this with your proposal for me?\nContrasts\n-My protocol works, your's doesn't. It's not enough to have a mix, the\nmix needs to be verifiable to avoid\none of the mixers inserting their own key and removing a key that\nshould be in there. That doesn't mean you can't make your protocol\nwork with some more magic, but magic is required.\n-You need a lot of online computation: the recipients need to be\ninvolved with validating the mix. By contrast in mine you need to wait for\nenough people to get their bitcoins to avoid partitioning. But this\nmight be a strength,\nnot a weakness.\n-You avoid the problem of de-anonymizing through having the protocol\nrun incompletely: if the permutation is correctly computed the\ntransaction goes through.\n-You also avoid all the problems with modifications to the bitcoin\nclients and miners.\n\nIt's definitely a good alternative, once you fix the problem in 1.\n\nOn a related note, private keys and signatures have better proofs of\nknowledge then hashes. Has this been considered in the P2SH\nconversation? There might be ways to use this to make even better\nmethods for enhancing anonymity.\nSincerely,\nWatson Ladd\n\n\n\n--\n\"Those who would give up Essential Liberty to purchase a little\nTemporary Safety deserve neitherĀ Liberty nor Safety.\"\n-- Benjamin Franklin\n\n\n-- \n\"Those who would give up Essential Liberty to purchase a little\nTemporary Safety deserve neitherĀ Liberty nor Safety.\"\n-- Benjamin Franklin",
"sig": "701c4b695c4264fbf6cbf9eaa8d97f90af26c156d8da70c284f40a34aa21dd52965b5e74bb96908fec504e5db7043d75ce3a80d7e8d2cec686482f49fe2fd599"
}