Received: from sog-mx-2.v43.ch3.sourceforge.com ([172.29.43.192] helo=mx.sourceforge.net) by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1W5Ciy-0000sq-AL for bitcoin-development@lists.sourceforge.net; Mon, 20 Jan 2014 11:09:00 +0000 Received-SPF: pass (sog-mx-2.v43.ch3.sourceforge.com: domain of petertodd.org designates 62.13.149.81 as permitted sender) client-ip=62.13.149.81; envelope-from=pete@petertodd.org; helo=outmail149081.authsmtp.net; Received: from outmail149081.authsmtp.net ([62.13.149.81]) by sog-mx-2.v43.ch3.sourceforge.com with esmtp (Exim 4.76) id 1W5Cix-0006Qc-4o for bitcoin-development@lists.sourceforge.net; Mon, 20 Jan 2014 11:09:00 +0000 Received: from mail-c235.authsmtp.com (mail-c235.authsmtp.com [62.13.128.235]) by punt18.authsmtp.com (8.14.2/8.14.2/) with ESMTP id s0KB8qHA080194; Mon, 20 Jan 2014 11:08:52 GMT Received: from savin (76-10-178-109.dsl.teksavvy.com [76.10.178.109]) (authenticated bits=128) by mail.authsmtp.com (8.14.2/8.14.2/) with ESMTP id s0KB8lX5031805 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Mon, 20 Jan 2014 11:08:49 GMT Date: Mon, 20 Jan 2014 06:08:47 -0500 From: Peter Todd To: Jeremy Spilman Message-ID: <20140120110847.GF3468@savin> References: <20140116212805.GA4421@petertodd.org> <20140117144601.GA8614@petertodd.org> <52DA093D.4070505@gmail.com> <52F8B4EC-F955-46E4-B871-3BEEFF69907D@taplink.co> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="0hHDr/TIsw4o3iPK" Content-Disposition: inline In-Reply-To: <52F8B4EC-F955-46E4-B871-3BEEFF69907D@taplink.co> User-Agent: Mutt/1.5.21 (2010-09-15) X-Server-Quench: 3dad3ae0-81c3-11e3-b802-002590a15da7 X-AuthReport-Spam: If SPAM / abuse - report it at: http://www.authsmtp.com/abuse X-AuthRoute: OCd2Yg0TA1ZNQRgX IjsJECJaVQIpKltL GxAVKBZePFsRUQkR aQdMdAIUElQaAgsB AmIbWlVeUFV7XGM7 bAxPbAVDY01GQQRq WVdMSlVNFUsrAWdz DkJ2Vxlxdg1GfTBx Y05rXD5YCBUudhco QlNcFD4FeGZhPWMC AkhYdR5UcAFPdx8U a1UrBXRDAzANdhES HhM4ODE3eDlSNilR RRkIIFQOdA4wAjM1 QwwCVRwjEVcIXD4+ NHQA X-Authentic-SMTP: 61633532353630.1023:706 X-AuthFastPath: 0 (Was 255) X-AuthSMTP-Origin: 76.10.178.109/587 X-AuthVirus-Status: No virus detected - but ensure you scan with your own anti-virus system. X-Spam-Score: -1.5 (-) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain -0.0 SPF_PASS SPF: sender matches SPF record X-Headers-End: 1W5Cix-0006Qc-4o Cc: Bitcoin Development Subject: Re: [Bitcoin-development] Stealth Addresses X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 20 Jan 2014 11:09:00 -0000 --0hHDr/TIsw4o3iPK Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sat, Jan 18, 2014 at 05:12:58PM -0600, Jeremy Spilman wrote: >=20 >=20 > > On Fri, Jan 17, 2014 at 8:55 PM, Alan Reiner wrot= e: > >> Isn't there a much faster asymmetric scheme that we can use? I've hea= rd people talk about ed25519, though I'm not sure it can be used for encryp= tion. > >=20 > > Doing ECDH with our curve is within a factor of ~2 of the fastest > > encryption available at this security level, AFAIK. And separate > > encryption would ~double the amount of data vs using the ephemeral key > > for derivation. > >=20 > > Using another cryptosystem would mandate carry around additional code > > for a fast implementation of that cryptosystem, which wouldn't be > > fantastic. > >=20 > > So I'm not sure much can be improved there. >=20 > In the case where payment is being sent only to Q1, and Q2 is for discove= ry only, perhaps we could use a 160-bit curve for d2/Q2 and e/P resulting i= n 20 byte vs 32 bytes in the OP_RETURN, and of course faster multiplication= =2E=20 >=20 > 80-bits of security I assume still greatly exceeds the actual level of pr= ivacy you get with the overall solution, and since Q2 is never protecting a= ctual funds... >=20 > But if it's a "real weakening" of the privacy then definitely not worth i= t, and even the added complexity of another curve seems possibly not worth = it... Keep in mind that Bitmessage uses the same ECDH mechanism as what stealth addresses will use. They seem to get decent enough performance =66rom it for a use-case not-unlike that of a Bitcoin wallet. In any case I'm interested in knowing actual performance numbers for it; last I talked to Kyle Drake he said he was working on getting ECDH numbers on Javascript, probably the slowest possible implementation of the idea. As for send to stealth addresses using prefixes, he's confirmed that you'll be able to do that will well under a second to brute-force the prefixes with the proposed OP_RETURN mechanism even with rather long 8-bit prefixes. --=20 'peter'[:-1]@petertodd.org 000000000000000190a2900f1a25c507a999fa11116f7bd0126618c1ebc4f5fb --0hHDr/TIsw4o3iPK Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQGrBAEBCACVBQJS3QO+XhSAAAAAABUAQGJsb2NraGFzaEBiaXRjb2luLm9yZzAw MDAwMDAwMDAwMDAwMDE5MGEyOTAwZjFhMjVjNTA3YTk5OWZhMTExMTZmN2JkMDEy NjYxOGMxZWJjNGY1ZmIvFIAAAAAAFQARcGthLWFkZHJlc3NAZ251cGcub3JncGV0 ZUBwZXRlcnRvZC5vcmcACgkQJIFAPaXwkfujHAf+JNlRMEOUyH882IJWoVbW3E6M kVvj9mhWeV3CyMba6zNzgoziGg0xcjBUgH8CQ3547GMqaEgzatacHNlGKXyvu49+ RBbGUfd2aUx5ktUEjU2R/49ZPweZ2Bik3dpK2ocqTAe03zPzTvdQk7+tFQnWu6iO 7FCatwD8qDX1gB0mQrIDcpf5lvjBTwc0f8XAP63Po7lWYBNxZUhji8mZxp8mQ/rT QXpU9VihHjdUza+sAoKh5LR8kqAa5Wq4Bn17fOaa3iD69sgJuaNIzPUrtAwfm3YW 3SVzk1q+8DvUiEtpfznTa82xEYhBeW9j4yPPghvB2BqrQx/MeovOY/xOkdTv9w== =omts -----END PGP SIGNATURE----- --0hHDr/TIsw4o3iPK--