Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

linkability (open-research-problems): improve and mention practical results #264

Open
wants to merge 2 commits into
base: master
Choose a base branch
from
Open
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions open-research-problems.md
Original file line number Diff line number Diff line change
Expand Up @@ -126,13 +126,13 @@ The goal is this research problem is to investigate and develop an asynchronous,

Mimblewimble/Grin leverage [confidential transactions](https://en.bitcoin.it/wiki/Confidential_transactions) to hide the identity of the sender and recipients. As such, there are no public amounts or addresses.

However, it is possible for someone listening on the network to build a transaction graph and possibly clustering entities together.
However, it is possible for someone listening on the network to build a transaction graph and possibly cluster entities together. Ivan Bogatyy has shown this attack works in practice, being able to [link 96% of Grin transactions](https://github.com/bogatyy/grin-linkability) broadcasted during the run of his experiment.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this was unfairly labeled as an "attack" in Bogaty's article. This is just a well known way of gathering information that's already public.


Techniques like [Dandelion++](https://arxiv.org/abs/1805.11060) mitigate this issue but are insufficient for a privacy coin.
The [Dandelion++](https://arxiv.org/abs/1805.11060) inspired transaction propagation technique implemented in Grin was insufficient to mitigate the attack. It successfully hides IP addresses but cannot aggregate enough transaction to obscure the transaction graph. This is insufficient for a privacy coin.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Dandelion++ is mostly used for obfuscating the source of the transaction. We happen to also aggregate transactions during the stem phase, but I don't think this was intended to sufficiently mitigate collecting the information. It was always well understood that's not sufficient for blind aggregation.


A much more promising design is this Mimblewimble [CoinSwap proposal](https://forum.grin.mw/t/mimblewimble-coinswap-proposal)
A much more promising design is the [Mimblewimble CoinSwap proposal](https://forum.grin.mw/t/mimblewimble-coinswap-proposal).

The goal of this research is to investigate ways to obfuscate the Grin transaction and implement such design.
The goal of this research is to investigate ways to obfuscate the Grin transaction graph and implement such design.

### Relevant Papers

Expand Down