Received: from sog-mx-3.v43.ch3.sourceforge.com ([172.29.43.193] helo=mx.sourceforge.net) by sfs-ml-3.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1SATcL-0008TM-7Z for bitcoin-development@lists.sourceforge.net; Wed, 21 Mar 2012 22:02:53 +0000 Received-SPF: pass (sog-mx-3.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.160.47 as permitted sender) client-ip=209.85.160.47; envelope-from=watsonbladd@gmail.com; helo=mail-pb0-f47.google.com; Received: from mail-pb0-f47.google.com ([209.85.160.47]) by sog-mx-3.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-MD5:128) (Exim 4.76) id 1SATcK-00065H-I3 for bitcoin-development@lists.sourceforge.net; Wed, 21 Mar 2012 22:02:53 +0000 Received: by pbcum15 with SMTP id um15so1238603pbc.34 for ; Wed, 21 Mar 2012 15:02:46 -0700 (PDT) MIME-Version: 1.0 Received: by 10.68.218.134 with SMTP id pg6mr14788880pbc.111.1332367366655; Wed, 21 Mar 2012 15:02:46 -0700 (PDT) Sender: watsonbladd@gmail.com Received: by 10.142.58.3 with HTTP; Wed, 21 Mar 2012 15:02:46 -0700 (PDT) In-Reply-To: References: Date: Wed, 21 Mar 2012 18:02:46 -0400 X-Google-Sender-Auth: dTF0OyeFjy9QgNQRE8vakUM7uQU Message-ID: From: Watson Ladd To: bitcoin-development@lists.sourceforge.net Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Spam-Score: -1.5 (-) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (watsonbladd[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1SATcK-00065H-I3 Subject: [Bitcoin-development] Proposal for a new opcode X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Mar 2012 22:02:53 -0000 On Wed, Mar 21, 2012 at 3:54 PM, Gregory Maxwell wrote= : > On Fri, Mar 2, 2012 at 2:57 PM, Watson Ladd wrote: >> Dear all, >> I am proposing a new opcode for the purposes of anonymous >> transactions. This new opcode enables scripts to be given proof that >> the receiver can carry out or has carried out a previous transaction. >> I'm currently working on a paper that discusses using this opcode for >> anonymous transactions. > > > Here is an alternative protocol: > > > N parties wish to purchase equal amounts of Bitcoin without the > exchange being able to link their future transactions, they each put > the relevant amount of gold/whatever up at the exchange. > > The exchange provides the exchanges public key, and the user provides > a public key for signing. =C2=A0 Externally the N participants agree on a > collection of non-cooperating mixers (the mixers may actually just be > the participants themselves, independent third parties, etc). =C2=A0 Each > participant generates a new bitcoin address, and encrypts it with the > the public keys of the the exchange and all the mixers using an > appropriate communicative homorophic scheme (or just a layers stack of > regular encryption keys). =C2=A0The participants then combine their > encrypted addresess into a block and hand it off to the mixing chain. > Each mixer randomizes the order and decrypts all the messages with its > key. > > At the end of the chain the exchange does the final decryption and > presents a list of addresses to the involved users. =C2=A0Users validate > that their address is in the set and sign the entire set. =C2=A0Once all > involved users have signed, the exchange pays. > > > This requires no changes to the Bitcoin system and could be trivially > implemented by anyone interested. =C2=A0It provides anonymity which is > strong so long as any one of the mixers is uncompromised. =C2=A0It has ve= ry > low overhead. =C2=A0 It is not directly resistant to disruption, but if > participation in an identified round requires a key provided by the > exchange, abusive users can be detected and excluded. > > Have I explained this clearly enough? I could probably implement the > whole system it if its unclear. > > Can you contrast this with your proposal for me? Contrasts -My protocol works, your's doesn't. It's not enough to have a mix, the mix needs to be verifiable to avoid one of the mixers inserting their own key and removing a key that should be in there. That doesn't mean you can't make your protocol work with some more magic, but magic is required. -You need a lot of online computation: the recipients need to be involved with validating the mix. By contrast in mine you need to wait for enough people to get their bitcoins to avoid partitioning. But this might be a strength, not a weakness. -You avoid the problem of de-anonymizing through having the protocol run incompletely: if the permutation is correctly computed the transaction goes through. -You also avoid all the problems with modifications to the bitcoin clients and miners. It's definitely a good alternative, once you fix the problem in 1. On a related note, private keys and signatures have better proofs of knowledge then hashes. Has this been considered in the P2SH conversation? There might be ways to use this to make even better methods for enhancing anonymity. Sincerely, Watson Ladd -- "Those who would give up Essential Liberty to purchase a little Temporary Safety deserve neither=C2=A0 Liberty nor Safety." -- Benjamin Franklin --=20 "Those who would give up Essential Liberty to purchase a little Temporary Safety deserve neither=C2=A0 Liberty nor Safety." -- Benjamin Franklin