#tlsnotary-chat

/

      • oakpacific joined the channel
      • waxwing
        so if one treated the webserver as trusted not to collude, then a user could pass around a file *.audit containing the encrypted traffic, the unencrypted traffic, the webserver's signature of hash(commitment hash | rsa enpms1 | server pubkey), and call that a proof.
      • the interesting question is how does that model differ from : webserver acts as auditor normally, and at end appends its signature to the html page
      • thus doing what the bank should have done in the first place :)
      • oakpacific
        yeah, that's my fundamental grunt, what difference does it make if people just trust us instead of the bank
      • waxwing
        oakpacific: it's a pretty big difference tbh
      • oakpacific
        http://www.weibo.com/1981622273/C79uAbD0D you know how do you achieve a claimed 800 million peak TPS in a 'payment system"? easy, by just not updating your database is how you do it
      • this is about the Wechat's new year red-envelope gifting system
      • waxwing
        yeah, that much i figured out, i can kind of guess what it's about :)
      • oakpacific
        people can get red-envelopes destined for other people by just changing the userid in the packet
      • waxwing
        oopsie
      • is this in ssl? mitm?
      • btw oakpacific so which of the two models i mentioned above makes sense to you?
      • the first keeps the notary server as dumb as possible, not seeing data. the second removes the need for another auditor. i guess.
      • oakpacific
        waxwing: why not both
      • waxwing
        oakpacific: choice is evil :)
      • ian grigg said so today on metzdowd/crypto. and of course FREAK supports his POV.
      • oakpacific
        waxwing: i meant, both model obviously satisfy a different need, right
      • there are demands for both
      • waxwing
        maybe; i don't know.
      • what would be really nice is to remove the collusion possibility between the notary server and the client so that the trust is still only in the bank/server pubkey, but i can't imagine that being possible. the premaster secret has to exist somewhere.
      • in a sense, that would be a violation of digital signatures because it would mean you can create a signature without knowing the pubkey
      • privkey, sorry
      • ridiculous idea #25: notary server commits 100 hashes of premaster secrets to the blockchain, then collects 100 requests for audits, waits for next blockhash and provably jumbles up which pms halves get used for which audits, making it impossible to use a pre-arranged premaster secret for a particular audit
      • back in a bit
      • HostFat joined the channel
      • waxwing__ joined the channel
      • waxwing has quit
      • waxwing__ is now known as waxwing
      • oakpacific
        well, if the trust is on us as humans, then maybe there is something easy we can do ;)
      • btw i didn't agree with your statement about the signature
      • waxwing
        which one oakpacific ?
      • oakpacific
        if you are interested i could explain how do you remove trust with NISC, it's fairly scalable judging by what i know, what we don't have is the code
      • waxwing
        non-interactive..?
      • dansmith_btc
        oakpacific, do explain, I'm still mystified by the NI part
      • seemed like the canon-mpc paper put together existing mpc scheme, i didnt realize there was a breakthrough with NI-ness
      • oakpacific has quit
      • waxwing has quit
      • oakpacific joined the channel
      • oakpacific
        sorry just got a bit freaked out
      • i just realized that by using DKIM, mainstream e-mail service providers break my OTR
      • now i am desperately trying to work something out
      • otr deniability i meant
      • waxwing joined the channel
      • llllllllll joined the channel
      • waxwing__ joined the channel
      • waxwing__ is now known as waxwing
      • waxwing
      • we don't need shitcoin we need tlsnotary :)
      • perhaps i am too cynical but i'm disappointed to see that mercury thing at the top of reddit
      • hmm, is it actually using coniswap?
      • or even coinswap
      • the dev just pinged me, it's apparently using atomic-cross chain as described here: https://github.com/TierNolan/bips/blob/bip4x/bi...
      • belcher joined the channel
      • oakpacific
        waxwing: so you just "freindly fired"
      • waxwing
        oakpacific: did i?
      • oakpacific
        waxwing: well if they do atomic-cross chain swap they are after decentralized anonymity measure, then they are 'our boys' ;)
      • waxwing
        yes i think, even if they only manage a decentralized shapeshift.io that's already a useful thing indeed
      • shapeshift is bound to get pwned one day. the FBI will do it if no one else gets round to it :)
      • oakpacific: what were you saying about sigs earlier? i didn't get it
      • oakpacific
        waxwing: well, if the mail service provider rsa-sha256 signs your email, then whatever otr protocol you use, you just can't deny that email is not from this particular address right
      • waxwing
        no, i meant when you said 'i disagree with your statement about signatures'
      • oakpacific
        oh, i c
      • well, it mostly goes along with my scheme in which volunteers can go to submit disguised secrets for use by the notary
      • \using non-interactive 2pc
      • waxwing
        non-interactive 2pc? how does that work?
      • oakpacific
        waxwing: i have been hestitate to say more because i don't understand properly, but it uses a special OT message, which allows you to construct a f(x,y) with y embedded, and just waiting for the x input
      • waxwing
        what's OT?
      • oblivious?
      • oakpacific
        yes
      • here is the paper from 2000, apparently for semi-honest cases it's relatively easy
      • yet i am not seeing any code surfacing...
      • waxwing
        wow, one round secure computation. star trek stuff.
      • oakpacific
        well, not really
      • judging by what i see, people are so bored with the boredom of it that they all went to work on more parties, malicious scenario
      • waxwing
        oakpacific: pls concretize it. suppose you had the code, how would it work in our case?
      • oakpacific
        okay
      • oakpacific goes to dig out the tlsnotary whitepaper
      • waxwing
        you don't recite it every night before bed? :)
      • oakpacific
        okay, firstly, the volunteer contributor calculates RSA(S2), SHA2PC(()XOR H22) and publish them to either a central server or the blockchain, where () is the H12 waiting for the auditee to fill in
      • waxwing
        'volunteer contributor'? who is that?
      • oakpacific
        waxwing: as i stated above, the idea was to decentralized the trust by asking people to connect to a server to contribute random secrets generated locally, or with other means
      • waxwing
        ok
      • oakpacific
        so the contributor also generates HMACV2PC(S2,K,M,H), which verifies the page M and its HMAC hash H supplied by the auditee, by outputting S2, the PMS when the HMAC verification passes, or 0, when it fails
      • this is also put online
      • S2 is just the PMS-half, sorry
      • waxwing has quit
      • now the auditee creates H1, and H12, then uses P_SHA2PC(H12 XOR H22) to generate the first 120 bytes of Y(not the rest), and use them to create all the keys he needs directly, and retrieve the page and commit it
      • now when he needs to be audited, he could just supply his M and H to the HMACV2PC function, and get S2, then publish to the world
      • anybody can verify S2 can be encrypted to RSA(S2), whether the contributor is online really doesn't matter
      • so that's it
      • waxwing joined the channel
      • waxwing
        i got disconnected after 'ok':
      • <waxwing> so in general terms, the volunteer (or anyone) knows that the auditee must have used the provided secret material. does the collusion risk then become (volunteer+auditee)?
      • (but, let me read the log oakpacific )
      • oakpacific
        waxwing: well, the assumption is, obviously, the majority of them are honest(also they should sign their secrets), and the number of honest contributors >the number of auditees
      • oakpacific has quit
      • oakpacific joined the channel
      • hearn joined the channel
      • waxwing
        oakpacific: so did i understand right, that it still needs interactivity from the contributor, to do the HMAC-finished part?
      • oakpacific
        waxwing: no
      • HMACV2PC is another OT 2PC message from the contributor
      • waxwing
        oh so it's like, the function is sitting there ready to run
      • oakpacific
        which once generated can be used anytime
      • yes
      • waxwing
        this is so hard to understand :)
      • hmacv2pc(s2, k, m, h), what is k?
      • oakpacific
        the hmac key, which is hidden in the message itself
      • waxwing
        ok so in vague terms he just puts the functions with his data in, ready to run, and the auditee comes along later and uses it
      • so what's this trust model issue? semi-honest i think it's called?
      • you testing dansmith_btc ?
      • dansmith_btc
        waxwing, yes
      • oakpacific
        waxwing: yes to both
      • waxwing
        oakpacific: but what does semi-honest mean ?
      • i just heard the term
      • oakpacific
        waxwing: it means the contributor follow the rules when participating in the protocol, e.g, if there are multiple parties, and they participate in generating an output, and all but one input all zero bits, then they are considered malicious, and the one remaining party's input is certainly going to be revealed
      • waxwing
        is that workable here?
      • oakpacific
        waxwing: well, the assumption is that the contributor will follow the rules and create real randomness
      • belcher
        drama in #bitcoin-wiki
      • heavy hitters arguing about some triviality :\
      • waxwing
        non-tonal triviality? :)
      • belcher
        heh
      • waxwing
        oakpacific: ah i see, so if the contributor's contribution is provably separated from the audit, it could be dealt with
      • you know like blockchain provable randomness maybe
      • oakpacific
        waxwing: yes, that's the point
      • waxwing
        hmm i think we have a 5 party protocol here :)
      • bank server, notary server, contributor, auditor, auditee
      • oakpacific
        there is strictly, no need for a certain auditor
      • you can just put out your bank statement, hmac, and s2
      • for anyone to see
      • waxwing
        yeah i get that, i was mulling over scenarios before
      • but i could easily see it being like that; notary for provable bank statement but still auditor because you don't publish your bank statement to the world
      • oakpacific
        one advantage is that: it might(assuming all will work out) eliminate the connection that can be developed over time between an auditee and an auditor
      • e.g., someone challenges an auditee to do an audit, the auditee goes on to bribe the auditor, in this scenario we can really assume a large percentage of auditors will fail
      • however when the auditor commited his secrets he had no idea what will happen in the future, so we could have his past working against him
      • so the honesty percentage can be relatively high
      • waxwing
        but when you boil it down, your argument is that a system like this makes the concept of "signed bank statement with trust only in server pubkey" possible, ie a disproof of my earlier statement
      • oakpacific
        that doesn't count as a proof until we sort everything straight :)
      • e.g., what's the difference with FHE?
      • waxwing
        sure. but it's like, another way to implement an oracle.
      • if that semi-honest setup works, i'd be really surprised if there's no code anywhere
      • does it have a big cpu hit maybe?
      • oakpacific
        waxwing: for semi-honest cases, interactive 2pc's workload does seem to be acceptable
      • according to my experiment and dansmith_btc 's
      • well
      • waxwing
        right but this one is different, right, one message or something
      • oakpacific
        the strange thing is, there are more complicated stuff out there