log☇︎
119100+ entries in 0.039s
asciilifeform: (answering 'what year' is O(N) because idiocy)
asciilifeform: phf: EST
asciilifeform: phf: Apr 25 17:36:18
asciilifeform: phf: 1sec
asciilifeform: (for this purpose)
asciilifeform: mircea_popescu: was there a typical tat ?
asciilifeform: notyet
asciilifeform: it is a form of theoretically-undetectable 'premine'.
asciilifeform: ben_vulpes: the (very old) gedankenexperiment concerned 'what if solving hashes is substantially cheaper than we chumps believe it to be, and promulgator of the coin knows the pill'
asciilifeform: into the ovens.
asciilifeform: aficionados of 'trusted agent' - straight to paypalschwitz.
asciilifeform: snore.
asciilifeform: there exists no proof that finding, e.g., sha2 collision, MUST take ~C cycles per.
asciilifeform: not even.
asciilifeform: because nobody reads the motherfucking code.
asciilifeform: it was a feature that derps pretend is in bitcoin, but never made it in, made fools of themselves
asciilifeform: thestringpuller: 'locktime' has 0 to do with crypto
asciilifeform: ben_vulpes: until dead ?
asciilifeform: if i owned the closet hasher, i would also carry right along 'consenting', aha.
asciilifeform: ~appears~ to do so.
asciilifeform: the burden of proof is on whoever asserts existence.
asciilifeform: (for one thing, the actual existence of trapdoors has not been demonstrated.)
asciilifeform: and quite likely there can be none.
asciilifeform: there is no 'trapdoor problem' for which 'intrinsic hardness' has been demonstrated.
asciilifeform: in some closet.
asciilifeform: to put it in more familiar frame, there is no way to prove that the majority of the bitcoin hash rate is not in fact happening on a pocket comp.
asciilifeform: 'proof of work', like 'symmetric crypto', does not in fact have a protocolic (vs promisetronic) existence !
asciilifeform: whatever form it takes.
asciilifeform: because how the fuck do you show that you have not 'pre-solved' the puzzle.
asciilifeform: the problem is demonstrably unsolvable in the general case.
asciilifeform: so no one should be excited.
asciilifeform: the basic concept is at least as old as ol' capt. kidd.
asciilifeform: ^ linux privesc since 2.6.22 (circa '07)
asciilifeform: in very other lulz, https://archive.is/n7lSx
asciilifeform: (and incidentally this is a problem shared with bitcoin, which may conceivably have been authored by someone with a pill for sha2.)
asciilifeform: as i see it , this is not satisfactorily solvable, the author cannot prove that he did not retain a crib sheet to the keyz. ☟︎
asciilifeform: the cryptographic mega-puzzler would be re how 'ck coin' could be 'provably fair' (i.e. the ciphertexts provably represent privkeys containing the entire monetary base, in aggregate )
asciilifeform: (i am almost wholly ignorant of how the latter mechanically works - so possibly not)
asciilifeform: possibly this is analogous to eulora's 'copper' ? ☟︎
asciilifeform: i.e. one where all of the coin is premined, but allocated into 'chests', published as privkeys enciphered in such a way as to be bruteforceable with reasonable effort
asciilifeform: unrelated to any of this, i recently went on a dig re crackpot altcoins, and was again disappointed, much of the phase space was never explored. for instance, it does not appear that anyone ever tried a 'captain kidd' alt ☟︎
asciilifeform bbl - meat
asciilifeform: this - gets painful, quickly.
asciilifeform: 'how many bugs shall we tolerate!?' 'seven!' ☟︎
asciilifeform: out of curiosity, why too much
asciilifeform: you only need log2(N) additions, to mult.
asciilifeform: how do you imagine your cpu mults.
asciilifeform: you shift-add.
asciilifeform: nah, this one is fixable
asciilifeform: *idealized
asciilifeform: ('martian bank' being simply a naive abstraction of 'idealizes swiss bank', where money supply is constant, and i can send from account a1 can send to a2 if and only if i have the privkey for a1, and double-spend - impossible, etc.) ☟︎
asciilifeform: rt's threshold)
asciilifeform: (this might be in the l0gz, but asciilifeform's own private, abortive, and ~entirely pointless attempt to 'invent bitcoin' in 2005-6 involved 'homomorphotron' (did not at the time know the term, or of anyone else's work on subj) that simulates 'martian bank' as ordinary computer program but somehow executed 'crypto-blinded' by multitude of independent machines, with the aggregate behaving correctly so long as collusion is below lampo
asciilifeform: prolly the usual overcompensation for spamolade.
asciilifeform: wow, d00d nuked comments entirely?!
asciilifeform: 'the game', in that case, 'isn't worth the candles'
asciilifeform: if i have to do 6 bignum mults myself, to ask my partner to homomorphicate 1 bignum mult, i am losing.
asciilifeform: which is you you need the branch
asciilifeform: other, unrelated observation, is that delegating computation with a homomorphotron is only +ev if you spend fewer cycles to encipher 'the question' and decipher 'the answer' than it would have taken you to carry out the entire computation in your own comp
asciilifeform: (and if i could! wouldn't need crypto at all. just shamir's secret-splitting algo...)
asciilifeform: if it relies on my being able to send packet from my house without it being immediately logged, some fraction of the time, then i personally cannot much profit from the scheme.
asciilifeform: btw i've been trying to come up with useful scheme standing on paillier, for >decade now, and if mircea_popescu writes one, i promise to read it.
asciilifeform: good idea.
asciilifeform: i only today dug him up...
asciilifeform: how does this not reduce to 'all in a kettle'..?
asciilifeform: can't speak for other folx, but i personally sit in a kettle.
asciilifeform: 'chewing scenery' - will not help.
asciilifeform: either it will make sense - or not
asciilifeform: i would rather leave it as exercise to the patient reader, mircea_popescu et al, than press it
asciilifeform: let's temporarily leave this part for later, and posit that mircea_popescu can both add and multiply homomorphically, via whatever means. i'd like to hear how he carries out the branching.
asciilifeform: scheme that relies on a and b, in besieged castle, to communicate with a non-besieged C, is not crypto.
asciilifeform: this gedankenexperiment strikes me as quite similar to the one where you 'defeat' 2nd law of thermo. by dumping heat into a black hole, and similar.
asciilifeform: crypto that dun work inside a 100% surrounded castle is not crypto.
asciilifeform: (neither has, of course, rsa.)
asciilifeform: it is no guarantee of any kind.
asciilifeform: if you know the total set of A-asked-B, you can put bounds on what was done.
asciilifeform: this is a problem.
asciilifeform: it isn't that i can say, with 100% certainty, that you multiplied; it is that i have != 0 bits of info re what you might be doing.
asciilifeform: (and we still have not arrived at the question of how to branch)
asciilifeform: how not ? if i know that you delegated a total of 3 ops, i know that your multiplicand is <= 3.
asciilifeform: aite. (i dun even dispute that a scheme where multiple parties are used for obfuscatory/smoke purposes ~can be useful~ - but it is not crypto in the normal sense. stego, perhaps.)
asciilifeform: would you still think that rsa were strong, if it sufficed to, say, collect 90% of the ciphertext that's left your house, to derive the privkey ?
asciilifeform: promise, not protocol.
asciilifeform: this is rather like the 'send the new key and signature in one shot' thread. crypto that dun work if the enemy watches both of your hands, ain't crypto.
asciilifeform: well they know that there were 3 additions.
asciilifeform: if you're locked in a room with'em, and see all of the steps, they know the 3.
asciilifeform: this is a card trick, not crypto.
asciilifeform: read. several times.
asciilifeform: this dun work with paillier. or any other known scheme.
asciilifeform: ~how many times~ to 'add C1' ??
asciilifeform: you gotta have a branch.
asciilifeform: make me a branch.
asciilifeform: and quite likely cannot exist.
asciilifeform: this does not exist.
asciilifeform: instead, you would need something like F(C1, C2, C3) == P3 + max(P1, P2).
asciilifeform: you cannot turingate with this, alone.
asciilifeform: homomorphic-under-addition just means that you can take C1, C2, encrypted ints P1, P2, and get C3, encrypted sum, that decrypts later to the correct sum of P1+P2
asciilifeform: and if you had one, you'd be done.
asciilifeform: except you need a crypto-branch.
asciilifeform: noshit.