-
Notifications
You must be signed in to change notification settings - Fork 992
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FAQ, first attempt (condensed from gitter chat) #298
Conversation
That's very helpful, thanks! |
Is there a source I can read about synchronous vs asynchronous mining? Searching around doesn't yield any good result. |
@Kargakis Are you looking for benchmarks (minimal advantage possible with 4x 1 process or likely better with 8x 1 process vs current 1 process with many mining threads) |
The quantum resistant claim is very misleading. grin is not quantum resistant. Switch commitments allow it to become quantum resistant with a minimum amount of disruption but if a QC appeared without warning the entire system would be subject to undetectable inflation. Not to mention coin theft, which switch commitments do nothing to prevent. |
@apoelstra Thanks. What would be a realistic, forward looking answer for The "just add big enough hashes" seemed nice, but I understand QC can make many supposedly fixed parts come loose and so they can be fiddled with. |
A realistic, forward looking answer is "Given sufficient warning, a softfork can be done to require all outputs include an unconditionally sound rangeproof, such as Oleg's scheme. This requires extra data which is already included (though hidden behind a hash) in all outputs, and which is currently not validated at all. Much later, a softfork can be done which freezes all coins which have not been moved in this way. This will destroy funds belonging to inattentive users, but also gives users who would rather preserve privacy than value the ability to forfeit their coins. Observe also that the privacy of the pre-first-fork history will be preserved, though post-quantum validators will be unable to convince themselves that no inflation occurred back then. At that point, it will be impossible for quantum computers to inflate the currency, though any inflation that occurred before the freeze would be permanent and undetectable. Further, Oleg's scheme is insufficient to prevent theft of coins, it is only protection against inflation. A more advanced scheme (a la zk-SNARKs) would be needed that internally proved the consistency of the hashed data without actually revealing it." |
Thanks! How about:
add to doc/range_proofs.md Quantum safetyProtection against quantum computing attacks is partially doable without adding new cryptographic assumptions:
Caveats:
To prevent both theft and inflation, something more advanced is needed. Adding assumptions, something like zk-SNARKs could internally prove the consistency of the hashed data without actually revealing it. |
There is no way to "detect theft but not inflation". You can always detect theft because your coins are gone. Detecting theft is useless. There is also no way to prevent theft but not inflation, it's hard to even say what that would mean. |
Thanks. Sorry, that was pretty daft of me :). Ok, will fix this up and make a Pull Request with the more correct FAQ text ASAP. |
No description provided.