@nothingmuch

607 Followers
1.4K Following
232 Posts
@Patricia to his credit, he finally got me to follow through on doing this ;-)
@TaliaRinger i wonder if a hash of a forbidden link is also verboten, but without something like that it'd be hard to authenticate new fedi profiles claiming to be old twitter profiles
@b0rk when i feel overwhelemed by a new project i tend to go to the security section and the CVEs because they high level understanding with detail oriented understanding in a way that tends to be higher SNR and less likely to lead to confusion/misconceptions
@waxwing as for the security, it doesn't say much and as far as i'm aware having a signature with knowledge of even a few bits of the key is enough to give lattice based attacks a real advantage. although i don't know how these attacks work, the point was more that this suggests a naive approach seems likely to be equivalent to revealing the key, perhaps trivially if the difference in order is enough to draw some conclusion about non-uniform distribution over bits

@waxwing i wasn't even considering prover as adversary... what i was referring to is in page 749, section 19.5.4 A Sigma protocol for the pre-image of a homomorphism, but it's about same order:

> We can even set H_2 := G_1 × G_2 with g ∈ G_1, u ∈ G_2, and |G_1| = |G_2|. Then for a given
> (v, w) ∈ G1×G2, proving knowledge of a ψ2 preimage of (v, w) proves equality of discrete-logs
> Dlog g
(v) = Dlog u (w) in distinct groups G_1 and G_2."

@mattblaze akshually, Elmo is "actually very familiar with [privacy and security], he said so himself: https://twitter.com/mmasnick/status/1590992955028176896
Mike Masnick on Twitter

“Wait. Wait. Did we already know that Tesla apparently stores everywhere that people drive *other* than the last half mile or so?”

Twitter

@waxwing if the fields are not of (almost) the same size then i think it gets more complicated... i've heard bit decomposition mentioned in this context, so this reduces to proving equivalence of bit commitments, but i don't see how this addresses the problem

also if there's a significant difference and one key is known to be uniformly sampled WRT the smaller field i think that reveals to the verifier that the top bits are fixed = 0, which if i'm not mistaken makes lattice attacks easy

@waxwing for similar sized curves with generators G_1, G_2, P_i = x G_i, you can use conjunctive composition of Schnorr proof apparently.

prover commits:

k <- Z_p
R_i = k G_i

and then responds to challenge e with v = k + x*e

cryptobook discusses these generalizations of Schnorr identity if i recall correctly

Classic coffee stains with LaTeX

Probably not for your thesis, but nevertheless worth checking out: Hanno Rein wrote the LaTeX Coffee Stains package which adds beautiful coffee stains to documents. Usage (coffee4) Stains cofeAm: 2…

texblog