Questions tagged [cryptography]

Practice and study of techniques for secure communication in the presence of third parties called adversaries

93 questions
19
votes
2 answers

Why are Monero addresses so long?

A raw Monero address is 95 characters long compared to 26-34 characters for a Bitcoin address. Monero integrated address are even longer at 106 characters. What is the cryptographic reason that causes Monero addresses to be so much longer than…
K Chan
  • 731
  • 6
  • 15
17
votes
2 answers

Why/how does monero generate public ed25519 keys without using the standard public key generation provided by ed25519 libraries?

Why/how does monero generate public ed25519 keys without using the standard public key derivation provided by ed25519 libraries? Inspecting the code for mininero (https://github.com/monero-project/mininero/blob/master/mininero.py), it seems that it…
Ryan
  • 1,257
  • 8
  • 13
16
votes
1 answer

Can I manually check consistency of Pedersen Commitments in RingCT?

Even though I fully trust the math behind RingCT and I know no moneroj can be created out of thin air, sometimes I'd like to see for myself the consistency of the Pedersen Commitment before/after any given transaction (ie. they sum up to the same…
13
votes
2 answers

Can you trustlessly trade Monero for Bitcoin?

Some cryptocurrencies can be traded in a trustless manner, also known as atomic cross-chain traded. This means that when the trade is done, either the entire trade is done, or none of it is (otherwise, one party could choose not to send their…
Christopher King
  • 3,120
  • 14
  • 65
11
votes
1 answer

What are Borromean signatures?

For more background info visit GitHub or Bitcointalk It looks like borromean signatures are going to be replacing schnorr signatures in the RingCT hardfork. What does this mean for Monero and RingCT performance etc? thanks
samwellj
  • 3,215
  • 4
  • 17
  • 32
10
votes
1 answer

Can someone walk me through a simple example to explain how RingCT works?

Original: https://www.reddit.com/r/Monero/comments/5irg81/questions_regarding_the_cryptography_behind_ringct/ I just read the RingCT paper, and there are a couple things that could use some clearing up for me. What is the m (message?) value that is…
kenshi84
  • 2,485
  • 1
  • 14
  • 33
10
votes
3 answers

In ringct, how are the range proofs kept separate from the pedersen commitments in a transaction?

Are the range proofs and pedersen commitments part of a transaction? Or are they not kept in a transaction at all?
samwellj
  • 3,215
  • 4
  • 17
  • 32
10
votes
4 answers

Is a Monero key backdoor possible?

Recently an article was published stating the possibility of the NSA or some other malicious organization creating backdoor undetectable Diffie-Hellman keys (source) to allow snooping. Is Monero at risk to an attack of this nature? If so, under…
well_then
  • 430
  • 3
  • 10
9
votes
1 answer

What cryptographic assumptions is Monero based on?

Most crypto systems security are based on assumptions that certain problems are difficult, or some mathematical conjecture is true. The only counterexamples I can think of are the one time pad and shamirs secret sharing scheme (which coincidentally…
Christopher King
  • 3,120
  • 14
  • 65
9
votes
1 answer

Are Confidential Transactions in Monero perfectly binding or hiding?

Bitcoin contributor Pieter Wuille recently commented on Reddit: Bulletproofs and the Pedersen commitments they operate on are perfectly hiding, but not perfectly binding. This roughly means that if they're adopted inside Bitcoin, and elliptic…
9
votes
1 answer

How do key images really work?

I have the following questions regarding the equation I=xHp(P): What is the hash function Hp? How can we know that Hp(P) is a point on the Ed25519 curve? Or is it not? Is the value I published with the transaction? How can an external person verify…
thelastone
  • 193
  • 5
9
votes
3 answers

How does the recent patched key image exploit work in practice?

For more info https://getmonero.org/2017/05/17/disclosure-of-a-major-bug-in-cryptonote-based-currencies.html This has been patched months ago and was never exploited which can be proven by running a node because it checks every transaction's key…
9
votes
2 answers

Is there information available about the Levin protocol?

Is there any information available about the Levin protocol? It seems to be used for the peer to peer communication. Things like: The working of the protocol? What are the benefits? Why was it chosen for Monero? Is it used in any other product?…
fatdoor
  • 609
  • 4
  • 9
9
votes
1 answer

How do payment ids work?

In particular, how do the encrypted ones work cryptographically. I'm guessing they are based on the shared secret.
8
votes
1 answer

What was the problem with ASNL forgery?

For background there is https://nickler.ninja/blog/2016/12/17/a-problem-with-ringct/ and this problem had been fixed before this post was made by changing ASNL to borromean signature. For background on what borromean signature is here is this…
samwellj
  • 3,215
  • 4
  • 17
  • 32
1
2 3 4 5 6 7