P2P Privacy
§
Research
§
- Clarified the adversary model further (WIP); we’ll develop it more by simulation. Attacks to be simulated are listed here, and are based on the adversary model in the same document. The related studies were referred to, including Waku’s documentation about adversarial models (provided by the Waku team).
- Analysis of anonymity and communication failures in the mix gadget: Assuming that n nodes sample (with replacement) k nodes from the population with N nodes, where at most M nodes are adversarial, the average number of k-paths with anonymity and communication failures are, respectively, given by n \left( \frac{M}{N} \right)^k and n \left(1 - \left(1 - \frac{M}{N}\right)^k\right). Calculated an upper bound on the probability that the number of k-paths with these failures are greater than their respective averages by the factor 1+𝛾1+γ, where 𝛾>0γ>0. compared the above bounds with simulations showing that they are tight. Analysis of different cases of 𝑀/𝑁={½,⅓,¼,1/10}M/N={½,⅓,¼,1/10} suggests that, for reliability purposes, some combinations of n and k could be more advantageous than others. The summary of this work is provided here.
- Started the investigation of the problem regarding mixing over a broadcasting channel, which is an interesting form of mixing in a sparse network. Using a broadcasting channel makes it impossible for an observer to learn who the recipient of the message is (assuming proper message relaying strategy). Making nodes indistinguishable requires a single cover traffic message per time slot, which is a step closer to ideal privacy. However, this has a great network overhead cost, which limits the scalability of the network significantly assuming a fixed bandwidth requirement per node. Also, made an observation about the impossibility of stake hiding, which is based on the fact that the network behavior of a node is reflected on the ledger and any disturbance of the node behavior must also be seen on the ledger. Document for reference.
Development
§
- Implemented the simulation of “basic” mixnet behaviors (Modified Sphinx, Cover traffic, Broadcasting). They’re very naive but should be enough for running basic adversary simulations. The simulator is being implemented in the
mixnet-v2-sim
branch in the nomos-specs repository. Basic usage and development progress can be found in the README, though it’s still heavily WIP. Sphinx size: If the payload size is 330 bytes (32 bytes block hash + 288 bytes validator proof) and an incentive tx is 512 bytes (which may not be enough), and if the number of mix layers is 3, a Sphinx packet is 1937 bytes (subject to change).
Data Availability
§
Research
§
Development
§
- Did benchmarks on DA, lib performance was way below expected and targets. Debugged issues, what was found is that the most problematic is proof generation. Discussed options for improvements: Parallelization (which is not really possible as is internally parallelized already) and amortized proof generation method. Ruse evaluation + Benchmarks can be found here.
PPoS/Consensus
§
Research
§
- Wealth concentration update: changes related to the introduction of the study structure, rearrangement based on new sections, and expanded/improved explanations.
Development
§
Coordination Layer
§
Research
§
- Study on DA fast proof generation: research was conducted on fast proof generation in the DA domain. The Feist-Khovratovich technique was examined, and libraries implementing this method were investigated. The general structure of the method and the approach it attempts to implement are explained here.
- Wrote a potential design for Mailboxes & Sovereign Transactions.
Development
§
Testnet + Insights
§
Research
§
Development
§
Research
§
Development
§
Miscellaneous
§