1/ Seraphis, a zero-knowledge proving system from UkoeHB and the Monero Research Lab for confidential transactions that is faster, lighter, and more private, is making excellent progress!

A thread on some of the key advantages to Seraphis:
2/ It's important to note before we go further that Seraphis is a protocol abstraction, and not a specific implementation, and so there are a lot of design decisions yet to be made in the instantiation of Seraphis used in the Monero privacy protocol in the future.
3/ The first key advantage that Seraphis brings is vastly improved scaling of transaction size and verification time as decoys increase versus the currently used CLSAG. This allows a move to larger ring sizes without severe impacts to initial blockchain download or wallet sync.
4/ You can see more detailed initial performance numbers below, but keep in mind these are initial numbers and may change (likely improve) as we get closer to a specific implementation:

github.com/monero-project…
5/ This will allow for a likely 64+ ring size (instead of the current 11), allowing for greater per-transaction privacy and reducing statistical or targeted attacks effectiveness. This is enabled by Seraphis being ~4x more efficient in verification and logarithmic size scaling.
6/ The second major advantage that Seraphis brings is the possibility to use a new and improved key structure, allowing for drastically more useful view-only wallets, and much simplified offline transaction creation/signing:

github.com/monero-project…
7/ This improved view-only wallet capability makes it much easier to provide view-only capabilities to 3rd-parties, such as for a public donation address, without requiring key image export/import or other time consuming and complex tasks.
8/ The key structure improvements also lead to greatly improved offline transaction creation/signing and greatly simplified multi-sig usage in Monero, two areas that have been much more difficult in Monero up to this point. This will be a key step forward in UX for these uses.
9/ The last advantage of the key structure change would be the unification of address types -- no more "standard" and "sub" addresses, just one common type!

This simplifies the experience for users without harming privacy, and improves UX across the board.
10/ These are incredibly exciting times for Monero, and we're thankful to see such a large influx of interest in improving the Monero protocol by members of the community, researchers, and developers!

Privacy is an arms race, and Monero is doing a great job staying ahead.
11/11 For a much more detailed look at Seraphis, including the cryptography and math behind it, check out the WIP paper below:

github.com/UkoeHB/Seraphis

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Monero || #xmr

Monero || #xmr Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @monero

30 Nov
RandomX was created to prevent ASICs from dominating mining of #Monero, and has proven to be the longest-lived ASIC-resistant mining algorithm ever implemented, preventing ASICs on the Monero network for 2y and counting.

RandomX is key to the mining decentralization of Monero.
Unlike other "resistant" algorithms, RandomX was built from the ground up to serve this exact purpose by people with decades of computing experience.

We're immensely grateful for the innovation and incredible work by @hyc_symas, sech1, tevador, and other contributors.
@hyc_symas To learn more about RandomX, check out the following two helpful resources:

- monerooutreach.org/stories/Random… by @xmroutreach
- localmonero.co/knowledge/mone… by @LocalMoneroCo
Read 4 tweets
27 Jul
A rather significant bug has been spotted in Monero's decoy selection algorithm that may impact your transaction's privacy. Please read this whole thread carefully. Thanks @justinberman95 for investigating this bug.

1/6
@justinberman95 If users spend funds immediately following the lock time in the first 2 blocks allowable by consensus rules (~20 minutes after receiving funds), then there is a good probability that the output can be identified as the true spend.

2/6
This does not reveal anything about addresses or transaction amounts. Funds are never at risk of being stolen. This bug persists in the official wallet code today.

3/6
Read 6 tweets
15 Sep 20
The long-awaited Perkins Coie whitepaper is now available!

"Anti-Money Laundering Regulation of Privacy-Enabling Cryptocurrencies"

This 40 page report is the most comprehensive to-date on compliance and Monero and will greatly assist adoption of XMR!

perkinscoie.com/en/news-insigh…
Some top quotes from the whitepaper:

"Allowing VASPs to support privacy tokens under current, tested AML regulations strikes the appropriate policy balance between preventing money laundering and allowing beneficial, privacy-preserving technology to develop."
"Not only do privacy coins provide public benefits that substantially outweigh their risks, existing AML regulations properly and sufficiently cover those risks, providing a proven framework for combatting money laundering and related crimes."
Read 12 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(