Taylor Hornby

Results 188 comments of Taylor Hornby

Some security/privacy considerations: 1. The different protocol actions, like sending versus receiving transactions, have different network traffic sizes/patterns. So even if a light wallet uses Tor, their ISP can still...

If the attacker has eclipsed a victim, then they don't need to compete against other miners to get the victim to accept their blocks, and so NCC's F becomes independent...

Master brainstorm list of requirements, non-requirements, desires, thoughts, to be added to and filtered later. **Privacy & Security** - Simplicity! - Security review! - It isn't a goal of this...

## Design Sketches (everything below will change unpredictably) **Constant-Bandwidth Protocol** - Parameters set the size and timing of container messages, relative to the start of the protocol. - Specify as...

I like this, once we have an anchor for each consensus rule we can grep the codebases for the anchors to find where all the rules are implemented (and to...

Ideally, devices should be able to accept an arbitrary amount of "named" inputs, where those names depend on the kind of device. For example, a simple compressor would have two...

If you have a guess for a_pk and rho then some kind of a Grover search probably lets you find the 192-bit r in ~2^96 time on a quantum computer....

Grover can also be used to speed up collision-finding to the cube-root rather than the square-root, e.g. http://arxiv.org/pdf/quant-ph/9705002.pdf (Høyer was my quantum computing prof and this was on the final...

Another consideration for post-quantum Zcash is the proof-of-work. A Grover search could speed up finding solutions to Bitcoin's PoW, but [this paper](https://arxiv.org/pdf/1710.10377.pdf) suggests Bitcoin ASICs are so fast that it...

Reviewers should check my understanding of the $\tau$ thing, I'm not 100% sure (another interpretation would be that $\in$ is a substring but if that's the case the encoding is...