asciilifeform: sorta how student might get to select a few exam questions from a pool, but there are others that are mandatory.
asciilifeform: mircea_popescu: the cure, i realized, is that ~some~ of the oldtx selected by Z must depend on value of prev block, so as to prevent waltzing of Z 'until all i need is the 10% i'm fraudulently storing instead of the 100%' .
asciilifeform: the plagiarist can make a block with higher PoW than the victim, ~every time, since he isn't handicapped by having to compute L(Z)
asciilifeform: and actually now that i think about it, it'd be guaranteed-lethal
asciilifeform: (the fact that the original victim could, normally, relay his original faster than a typical plagiarist could hash, is immaterial, it is still a potential vuln)
asciilifeform: oooh gotta revisit upstack, briefly, http://btcbase.org/log/2017-03-01#1620677 << ~this~ in particular cannot be done as written. else, the first relayer of a freshly mined block could simply steal the work that went into determining luby(Z) and get massive head start on making his own block, which he then relays instead of the plagiarized.☝︎
asciilifeform: what are ~all~ of the places where A has the ecstasy, but B does the laundry, where A!=B☟︎
asciilifeform: ~100% of asciilifeform's line of thought re 'trbi', from this, to the casks thing, etc., was only 'how to plug the leaks'
asciilifeform: in that one party creates the sharp broken edge, but very other people have to live with the cost.
asciilifeform: it is one of the major leaks in the vacuum piping
asciilifeform: ( asciilifeform also has pretty strong bias against mechanically-complicated crypto. )
asciilifeform: i dug for the can-guarantee-avg-case-np-hard? thing -- found zip.
asciilifeform: you will find that many 'wouldn't that be useful..' items are ~entirely absent in the public lit. and no prizes for guessing why.
asciilifeform: dunno re mircea_popescu's planet, on mine, semiconductors sorta stopped, in 2009-ish, and aren't threatening to develop mega-improvement
asciilifeform: (if you need a jupiter-sized machine, it isn't very hotstuff algo-wise)
asciilifeform: there's computables and there's computables-and-doables. unfortunately distinct sets in practice.
asciilifeform: mircea_popescu: how's that. the seekrit, is blown, neh
asciilifeform: if he has half a brain -- knows which k.
asciilifeform: say, today, k3, k4, k7, ... , k9 sign. tomorrow, k7, k21, k3, ... , k333. next day, k42, k3, ... whatever. now 'you can't verify that no subgroup...' ~within~ the algo, but someone who has the whole list and notices that only k3 recurrs...
asciilifeform: mircea_popescu: let's suppose you had ring signature, we have edge of the sword. how does the hilt work ? i.e. you have an output, that is spendable, but you want it spendable by ~you~, not by 1,001 randomly-selected pubkeys.
asciilifeform: graph-circuit appeals because it -- does
asciilifeform: rsa doesn't pretend to a known complexity class tho.
asciilifeform: ( spoiler : can't prove the hardness of magicking ~your particular~ graph. )
asciilifeform: i actually worked with this notion last year, when investigating nonretarded (i.e. of provable complexity) block ciphering. and came to same realization that mircea_popescu is probably about to come to