212400+ entries in 0.136s

a111: Logged on 2016-02-10 20:10 mircea_popescu: basically showing
that a+b < c is
true or false for a, b, c in R is a harder-than-NP problem.
mircea_popescu: you may be challenged
to either show
the hamiltonian in
the homomorphic graph, or else
to show
the homomorphism between
the graphs.
mircea_popescu: anyway.
the encryption scheme is like
this : you generate a large graph with a hamiltonian cycle ; and a homomorphic graph.
mircea_popescu: i derrided it for being impractical but i can't fucking find
the discussion
mircea_popescu: and
there was a scheme proposed whereby you either show
the graphs or
the relation ; op keeps challenging you ; each correct response increases
the probabiling of
truth by a factor of 2
mircea_popescu: well, deciding whether
two given graphs are homomorphic is > np.
mircea_popescu: asciilifeform
there's
this scheme whereby i create a graph, A and a homomorphism of it A'. you get ot see A', and may challenge me
mircea_popescu: (note
that
the decomposition needn't be Vs but will likely be a homomorphism, which POSSIBLY
tyakes us straight
to
the hardest code known
to man,
the see-or-pick homomorphisms)
mircea_popescu: tsk. not algebraically either. how
the fuck would V(all) work so it's not decomposed into Vi(each)
mircea_popescu: asciilifeform re-reading i am pretty much convinced
that
the requirement
that a) signatures are produced pairwise nevertheless b) no pairwise verification function exists yet c) verification works on a group of
them is batshit insanity. might as well ask for a 5 smaller
than 4.
mircea_popescu: in FACT,
the MORE sigs it uses in a ring,
the more expensive
the
tx fee should be.
BingoBoingo: <omraphantom> me bored with
too much
time = crazy idea written out with no way
to make it real << Go
to lumber yard, buy wood. Go
to hardware store buy
tools. Make
things until you start making
things of complexity necessary
to carry skills into building crazy
things
mircea_popescu: V(K1, S1)=false, V(K2, S1)=false, .... BUT V(K1,K2,..,KN, S1) =
true if and only if K1 signed S1 ; similarily with k2 and s2 all
the way
to n
mircea_popescu: it's worse
than
that, by any owner of any k in
the list.
BingoBoingo: <mircea_popescu> hey BingoBoingo were you in georgia ? <<
That's
thestringpuller
mircea_popescu: once stated
the pipedream portion is pretty painfully obvious ; but nevertheless, maybe ?
mircea_popescu: asciilifeform
this is an "idea" item not a
technological object, so bear with me. a "ring signature" is a set of signatures with a) arbitrary cardinality n which has
the property
that b) while it can be verified
the correct signature was offered it c) can't be established wich signature
that is.
mircea_popescu: i would still love
to see, for what it's work, PROPER ring signatures.
mircea_popescu: "all
txn are 2 in 2 out" fixed width
txn seems nailed down at
this point. i can't see how an argument would work
that'd offset
the evident gains.
mircea_popescu: lubby coding. better
than simple hashing for
this purpose. deifnitely.
mircea_popescu: if you ever get kicked out of engineering
tower should prolly
try out
the arts, become draughtsman
mircea_popescu: but just because we're all going
to die it does not follow we should go around on stilts and weird beak masks either
mircea_popescu: i dunno.
the further you go prng-away from
the "quote
the nth line in
the log",
the closer you getr
to "my solution
to mining is mining+mining"
mircea_popescu: you can't
turn out your wife without being married
to a whore, alfie.
mircea_popescu: cuz it'll be ==
the hashing if it's as hard as
the hashing.
mircea_popescu: half
the reason i'm a shitty scientist : unlike
the good ones, i get laid.
mircea_popescu: he who knows a secret key is a bitcoin user ; he who can say if ia signed
transaction is valid or invalid is a bitcoin node ; he who can include a bitcoin
transaction in a block is a bitcoin miner.