Practice and study of techniques for secure communication in the presence of third parties called adversaries
Questions tagged [cryptography]
93 questions
19
votes
2 answers
Why are Monero addresses so long?
A raw Monero address is 95 characters long compared to 26-34 characters for a Bitcoin address.
Monero integrated address are even longer at 106 characters.
What is the cryptographic reason that causes Monero addresses to be so much longer than…
K Chan
- 731
- 6
- 15
17
votes
2 answers
Why/how does monero generate public ed25519 keys without using the standard public key generation provided by ed25519 libraries?
Why/how does monero generate public ed25519 keys without using the standard public key derivation provided by ed25519 libraries?
Inspecting the code for mininero (https://github.com/monero-project/mininero/blob/master/mininero.py), it seems that it…
Ryan
- 1,257
- 8
- 13
16
votes
1 answer
Can I manually check consistency of Pedersen Commitments in RingCT?
Even though I fully trust the math behind RingCT and I know no moneroj can be created out of thin air, sometimes I'd like to see for myself the consistency of the Pedersen Commitment before/after any given transaction (ie. they sum up to the same…
kenshi84
- 2,485
- 1
- 14
- 33
13
votes
2 answers
Can you trustlessly trade Monero for Bitcoin?
Some cryptocurrencies can be traded in a trustless manner, also known as atomic cross-chain traded. This means that when the trade is done, either the entire trade is done, or none of it is (otherwise, one party could choose not to send their…
Christopher King
- 3,120
- 14
- 65
11
votes
1 answer
What are Borromean signatures?
For more background info visit GitHub or Bitcointalk
It looks like borromean signatures are going to be replacing schnorr signatures in the RingCT hardfork. What does this mean for Monero and RingCT performance etc? thanks
samwellj
- 3,215
- 4
- 17
- 32
10
votes
1 answer
Can someone walk me through a simple example to explain how RingCT works?
Original:
https://www.reddit.com/r/Monero/comments/5irg81/questions_regarding_the_cryptography_behind_ringct/
I just read the RingCT paper, and there are a couple things that could use some clearing up for me.
What is the m (message?) value that is…
kenshi84
- 2,485
- 1
- 14
- 33
10
votes
3 answers
In ringct, how are the range proofs kept separate from the pedersen commitments in a transaction?
Are the range proofs and pedersen commitments part of a transaction? Or are they not kept in a transaction at all?
samwellj
- 3,215
- 4
- 17
- 32
10
votes
4 answers
Is a Monero key backdoor possible?
Recently an article was published stating the possibility of the NSA or some other malicious organization creating backdoor undetectable Diffie-Hellman keys (source) to allow snooping.
Is Monero at risk to an attack of this nature? If so, under…
well_then
- 430
- 3
- 10
9
votes
1 answer
What cryptographic assumptions is Monero based on?
Most crypto systems security are based on assumptions that certain problems are difficult, or some mathematical conjecture is true. The only counterexamples I can think of are the one time pad and shamirs secret sharing scheme (which coincidentally…
Christopher King
- 3,120
- 14
- 65
9
votes
1 answer
Are Confidential Transactions in Monero perfectly binding or hiding?
Bitcoin contributor Pieter Wuille recently commented on Reddit:
Bulletproofs and the Pedersen commitments they operate on are
perfectly hiding, but not perfectly binding. This roughly means that
if they're adopted inside Bitcoin, and elliptic…
scoob
- 215
- 1
- 5
9
votes
1 answer
How do key images really work?
I have the following questions regarding the equation I=xHp(P):
What is the hash function Hp?
How can we know that Hp(P) is a point on the Ed25519 curve? Or is it not?
Is the value I published with the transaction?
How can an external person verify…
thelastone
- 193
- 5
9
votes
3 answers
How does the recent patched key image exploit work in practice?
For more info https://getmonero.org/2017/05/17/disclosure-of-a-major-bug-in-cryptonote-based-currencies.html This has been patched months ago and was never exploited which can be proven by running a node because it checks every transaction's key…
samwellj
- 3,215
- 4
- 17
- 32
9
votes
2 answers
Is there information available about the Levin protocol?
Is there any information available about the Levin protocol?
It seems to be used for the peer to peer communication.
Things like:
The working of the protocol?
What are the benefits? Why was it chosen for Monero?
Is it used in any other product?…
fatdoor
- 609
- 4
- 9
9
votes
1 answer
How do payment ids work?
In particular, how do the encrypted ones work cryptographically.
I'm guessing they are based on the shared secret.
Christopher King
- 3,120
- 14
- 65
8
votes
1 answer
What was the problem with ASNL forgery?
For background there is https://nickler.ninja/blog/2016/12/17/a-problem-with-ringct/ and this problem had been fixed before this post was made by changing ASNL to borromean signature. For background on what borromean signature is here is this…
samwellj
- 3,215
- 4
- 17
- 32