Seraphis icon indicating copy to clipboard operation
Seraphis copied to clipboard

Privacy-focused tx protocol

Results 5 Seraphis issues
Sort by recently updated
recently updated
newest added

In appendix A.3 *Enote Ownership Proof*, the implementation paper states "Here we see that binding ko[g/x/u] to K allows enote ownership proofs to demonstrate a relationship between K and Ko."...

@coinstudent2048 Feedback for [A Report on Seraphis](https://raw.githubusercontent.com/coinstudent2048/writeups/main/seraphis.pdf). - 1.1 - Generators in `{G_0, G_1}` can overlap with `{H_0, H_1}`. It's only _within_ the sets that unknown DL relation is necessary....

In section 8.2.2 of Implementing Seraphis, "Secret uniqueness: `input_context`", the paper states "To further ensure uniqueness *within* a transaction, transaction verifiers must mandate that all values `xK_e` in a transaction...

We need to have a formalized version of the privacy matrix (pp. 3-4) for security analysis. So far, it is informal. For now, I don't know how to do this...