Podcasts about ringct

  • 6PODCASTS
  • 13EPISODES
  • 32mAVG DURATION
  • ?INFREQUENT EPISODES
  • Feb 8, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about ringct

Latest podcast episodes about ringct

Monero Talk
A Holistic Security Analysis of Monero Transactions with Dr. Julian Loss (Monerotopia23)

Monero Talk

Play Episode Listen Later Feb 8, 2024 40:22


88MWhce9wToCCENbRgfZ6X54Dx8HF4bYY79YkYN9nXeqCDmykzXuq48HWe6k9eZDkA4iYpLbTsvpXPnAGCALHTTMLUp8cWi OR DONATE HERE: https://www.monerotalk.live/donate Monerotopia 2023 - El Dinero de la Gente Speaker: Dr. Julian Loss (Faculty at CISPA Helmholtz Center for Information Security, Germany) In this talk, Julian Loss presents his recent work on a Holistic Security Analysis of Monero transactions, focusing on its transaction scheme, RingCT (Ring Confidential Transactions). Dr. Loss addresses the central question of RingCT's security and the lack of a comprehensive security proof for the entire system. The talk covers components like ring signatures, commitments, range proofs, and stealth addresses, providing insights into Monero's privacy-focused approach! Links: https://twitter.com/julian_loss https://cispa.de/en/research/groups/loss Watch on YouTube (https://youtu.be/QQCmFDN9klw) TELEGRAM: https://t.me/monerotopia MATRIX: https://matrix.to/#/%23monerotopia%3Amonero.social MoneroTopia23 Confer Vids: ODY: https://odysee.com/@MoneroTalk:8/Monerotopia23:8 TY: https://youtube.com/playlist?list=PLfJ_JjSwYaa810CWboNcPX7cY-JYEWo-4 A SUPER Thank you to CakeWallet.com and Monero.com for being the Main Stage Sponsor! https://twitter.com/cakewallet https://twitter.com/monerocom ITUNES: https://apple.co/34W7FVp SPOTIFY: https://spoti.fi/2t1y9b4 STITCHER: https://bit.ly/2tUcIck ODYSEE: https://bit.ly/3bMaFtE WEBSITE: https://www..Monerotopia.com CONTACT: monerotopia@protonmail.com Mastedon: @Monerotopia@mastodon.social TWITTER: https://twitter.com/monerotopia INSTAGRAM: https://www.instagram.com/monerotopia/ DOUGLAS: https://twitter.com/douglastuman SUNITA: https://twitter.com/sunchakr

ASecuritySite Podcast
Research: Can Privacy and Traceability Exist Together: Tracing Keys and Jurisdictions?

ASecuritySite Podcast

Play Episode Listen Later Jul 30, 2023 14:39


Blog: https://medium.com/asecuritysite-when-bob-met-alice/can-privacy-and-traceability-exist-together-tracing-keys-and-jurisdictions-bfc395d502a Introduction Privacy and traceability are two sides of the same coin, and where the coin will never land on its side. If you want privacy in a transaction, you have to hide the payer and payee and the transaction value. All that needs to happen is that there is proof that the payer has enough currency to pay the payee. We can do this with a range proof — so that Bob can show that the sum of his previous transactions minus the current one is greater than zero. But, this stops any traceability and stops investigators from investigating the trail of an illegal transaction. It's a dilemma that can keep cybersecurity professionals awake at night and where a few bad apples can spoil the whole bunch. But, if we add traceability — such as in Bitcoin — we remove the privacy aspect, and if someone links your Bitcoin address to you and the others you trade with, they will be able to see all your transactions. “Ah, I see”, they might say, “That Bill has just bought a ticket for a bus journey in Edinburgh at 10:03 am”. Along with this, we have different requirements in different jurisdictions and where we might want to limit the investigator power in one jurisdiction to others. For this, John Gilmore — one of the original Cipher Punks — wrote: “We are literally in a race between our ability to build and deploy technology, and their ability to build and deploy laws and treaties. Neither side is likely to back down or wise up until it has definitively lost the race” And, so, the tension between strong cryptography, which protects privacy, and the ability to monitor and investigate remains as open as ever. In the UK, the Online Safety Act could aim to insert backdoors in cryptography in order to monitor communications. So, is it possible to keep things private but also make them traceable? For this, a new paper outlines the TRCT (Traceable Anonymous Transaction Protocol for Blockchain) protocol [1]: The focus of the paper is on the anonymous cryptocurrencies such as Monero, Dash and ZCash. It uses an Extractable Proof of Knowledge (EPoK) to produce a Zero Knowledge Proof (ZKP) for a transaction. This can then be added to the RingCT method of anonymity to produce traceable transactions for the participants and the amount transacted. The transaction, though, is still kept anonymous. The paper pinpoints the usage of Monero in a number of crimes, such as for the Wannacry ransomware attack and where the adversaries converted their Bitcoin rewards into Monero tokens [here], and which has not been since been traced. This problem has become so difficult for law enforcement that privacy-protecting cryptocurrencies have been banned in Canada, South Korea and Australia. TRCT An overview of TRCT is defined in Figure 1. With this, we have a miner which collects broadcasted transactions, and creates a consensus with other miners. An Authority is then responsible for linking account addresses and transactions and which can trace anonymous account addresses of the actual payer and payee and resolve the transaction amount. For TRCT, the payer generates a long-term key pair and then creates a one-time address (Figure 1). This can then be sent to the payer. The transaction is then anonymised for the payer address, payee address and transaction value using the Ring CT protocol, and which integrates the EPoK scheme. The miner then receives this and checks that it is valid and that the payer has enough currency in their account to make the payment. Next, the miner will check the EPoK so that it can be traced by the authority — and without discovering the secret details in the transaction. The authority can then trace the hidden content in the transaction (Figure 2). Figure 1 [1] Figure 2: [1] While applied in RingCT, the TRCT can be generally applied to any permissionless and permissioned blockchain, as it does not affect the underlying logic of the blockchain. In this, a trusted authority creates a tracing key and publicises its public key to the miners and whether these miners may be enabled or not for the integration of EPoK. In a permissioned blockchain, there are typically fewer nodes that create the consensus, and where it is thus easier to broadcast and update the tracing key. Overall, the authority is then used to oversee all the transactions, and decide whether there are illegal transactions, and also trace them. The control of the tracing key can then use attribute-based encryption to control its usage and using threshold-based sharing to control the usage of the key. For example, the FBI, CIA and GCHQ could agree on a 2-from-3 share approach, where two agencies have to come together to regenerate the tracing key. This approach allows for different jurisdictions to generate their own tracing key and where they cannot trace within any other jurisdiction. The addition of tracing tags also allows the tracing of high-value transactions. Next, let's cover ring signatures and RingCT. Ring signatures And so there has been a leak of information at the White House. Donald Trump calls in his Cyber Security leads and tells them, “I know one of you leaked the information, but I can't tell which one”. How can Donald tell that one of his leads has leaked the information but does not know which one? Well, this can be achieved with a ring signature, and which provides anonymity, unforgivably and collusion resistance. A ring signature is a digital signature that is created by a member of a group which each has their own keys. It is then not possible to determine the person in the group who has created the signature. The method was initially created by Ron Rivest, Adi Shamir, and Yael Tauman in 2001, and in their paper, they proposed the White House leak dilemma. Creating the ring In a ring signature, we define a group of entities who each have their own public/private key pairs of (P1, S1), (P2, S2), …, (Pn, Sn). If we want an entity i to sign a message (message), they use their own secret key (si), but the public keys of the others in the group (m,si,P1…Pn). It should then be possible to check the validity of the group by knowing the public key of the group, but not possible to determine a valid signature if there is no knowledge of the private keys within the group. So let's say that Trent, Bob, Eve and Alice are in a group, and they each have their own public and secret keys. Bob now wants to sign a message from the group. He initially generates a random value v, and then generates random values (xi) for each of the other participants, but takes his own secret key (si) and uses it to determine a different secret key, which is the reverse of the encryption function. He now takes the message and takes a hash of it, and thus creates a key (k). This key will be used with symmetric encryption to encrypt each of the elements of the ring (Ek), and then each element of the ring uses an EX-OR function from the previous element: Each of the random values for the other participants is then encrypted with the public key of the given participant. Bob then computes the value of ys in order to create the ring (the result of the ring must equal v). He will then inverse this value to produce the equivalent private key (xs). Bob now releases the overall signature, and the random x values, along with the computed secret key. To check the signature, the receive just computes the ring and checks that the result matches the sent signature. The basic method are: 1. Generate encryption with k=Hash(message). 2. Generate a random value (u). 3. Encrypt u to give v=Ek(u). 4. For each person (apart from the sender): 4.1 Calculate e=si^{Pi} (mod Ni) and where si is the random number generated for the secret key of the ith party, and Pi is the public key of the party. 4.2 Calculate v=v⊕e 5. For the signed party (z), calculate sz=(v⊕u)^d (mod Nz) and where d is the secret key of the signing party. We will end up with the signature (v=Ek(u)), and which completes the ring. The basic method involves creating Bob creating fake private keys for the other people in the ring: The verification of the ring is then: Ring Signatures in Monero The major problem with the Bitcoin network is that the amount of a transaction and the sender and receiver of the funds are not private, and someone who knows someone's address can trace their transactions. This is the case because the blockchain needs to check that the sender has enough funds to pay the recipient. Thus many cryptocurrencies are looking for ways of anonymising the transaction. Ethereum, for example, uses zk-Snarks to hide identities. One method of preserving identity was proposed by Rivest et al and used RSA encryption. Unfortunately, it is not efficient for modern systems, thus, Greg Maxwell's defined an elliptic curve method as a new way of creating the ring signature: the Borromean ring signature [paper]. The cryptocurrency Monero then adopted the method for anonymising transactions but has since migrated to a new method: Multi-layered Linkable Spontaneous Anonymous Group signature. This method hides the transaction amount and the identity of the payer and recipient [paper]. It is now known as RingCT (Ring Confidential Transactions), and was rolled out in January 2017 and mandatory for all transactions from September 2017. Conclusions TRCT provides a roadmap for the integration of tracing keys and the segmentation of rights of access. It is unlikely that we will see the implementation of this method is Monero anytime soon, but it could be applied to new methods. It is only interesting to see it applied to permissioned blockchains, and it could be useful in banking applications which require privacy but traceability. References [1] Duan, J., Wang, L., Wang, W., & Gu, L. (2023). TRCT: A Traceable Anonymous Transaction Protocol for Blockchain. IEEE Transactions on Information Forensics and Security.

Base Layer
Base Layer Episode 056 - Riccardo Spagni (Monero)

Base Layer

Play Episode Listen Later Aug 4, 2019 59:08


Riccardo Spagni, the man, myth and legend at Monero joins us on Base Layer and it's a massive show! Not only is this a crash course in what Monero is for beginners it's also got updates and some great detail into what's happening at Monero. In addition this was a really important conversation as we've seen yet another massive data hack at a bank, with 100m records stolen. We discuss the tech that is involved in Monero (Ring signatures, RingCT and stealth addresses), commitments and much more. Also a great discussion for those trying to understand the differences in privacy coins like Monero to Bitcoin and Ethereum, among others. Listen and learn! 

Monero Talk
Tim Ruffing on Omniring, a new RingCT method. Also, get ready for MoneroKon & CasaDeMonero!

Monero Talk

Play Episode Listen Later Jun 17, 2019 63:59


Monero Talk
RingCT, Flood Attacks, zksnarks, CLSAGS, MoneroKon & CasaDeMonero Party w/ Sarang Noether & Brandon

Monero Talk

Play Episode Listen Later Jun 10, 2019 46:29


Flippening - For Crypto Investors
Evolution of Crypto-Focused Venture Capital w/ Stephen McKeon from Collaborative Fund (Ep. 0043)

Flippening - For Crypto Investors

Play Episode Listen Later May 9, 2019 68:17


My guest today is Stephen McKeon. Stephen is a visiting fellow at the Cambridge Centre for Alternative Finance, a finance professor at the University of Oregon, and most relevant to this podcast, a partner at Collaborative Fund where he’s leading a dedicated effort called Collab Crypto. This is Stephen’s 3rd appearance on the podcast, making him our most frequent guest. His other two appearances were on episode 19, “The Economics of Cryptoasset Markets” and our very popular security token audio documentary entitled, “Tokenize The World.” Professor McKeon is back on the show to explore the state of crypto-focused venture capital, Collab Crypto's thesis and approach to structuring investments, and what Stephen believes to be the biggest investment opportunities. In this episode we discuss: How Stephen got involved with Collaborative Fund The current state of crypto VC Whether investors in the crypto space are getting more sophisticated How the crypto space is maturing Which funds provided inspiration for Collab Crypto Location patterns in crypto investments Governance and allocation Investment protection and how it is being standardized How Collab Crypto is positioned to provide value Equity vs. tokens Institutional Shareholder Services Protections against excessive dilution Opportunities beyond crypto assets and exchanges What’s happening in the security tokenization space Stephen’s thoughts about debt markets Value-added custody Where the scarcities are located in the crypto investment space Types of teams that are most successful in the crypto space Sponsors Veil Project Veil defines itself as ‘privacy without compromise’ — providing anonymity through a combination of technologies like Zerocoin and RingCT. Having launched this year with over $1 million in seed funding, Veil boasts an experienced team, including members working on Ravencoin, PIVX, and more. Before its launch, the Veil team released the X16RT mining algorithm, which has been adopted by projects seeking resistance to ASICs and FPGAs. Veil’s hybrid Proof-of-Work & Proof-of-Stake consensus lets users mine the coin, stake with Zerocoin, or both. Find Veil on leading data feeds like Nomics, CoinMarketCap, Blockfolio, & CoinGecko. To learn more about Veil, check out their website here. Nomics’s Cryptocurrency Market Data API The Nomics API offers squeaky clean and normalized primary source trade data offered through fast and modern endpoints. Instead of having to integrate with several crypto exchanges, you can get everything through one screaming fast fire hose. If you found that you or your developer have to spend too much time cleaning up and maintaining datasets & ingesting market cap data, instead of identifying opportunities. Or if you’re tired of interpolated data and want raw primary source trades delivered simply and consistently with top-notch support in SLAs, then check us out here.

Flippening - For Crypto Investors
PSA: Crypto Tax Loss Harvesting (Before The Next Bull Run)

Flippening - For Crypto Investors

Play Episode Listen Later Apr 30, 2019 11:45


Today, instead of an interview, you’ll hear a short public service announcement about tax-loss harvesting.Right now, during this period between the bear market and a potential bull market, where prices are going sideways, it would behoove a lot of people to consider doing some tax-loss harvesting To explain tax-loss harvesting in more detail, you’ll hear from my friend, Zac McClure, co-founder of TokenTax. I personally go to Zac for help with this stuff. In this short episode, you’ll learn: What tax-loss harvesting is What’s allowed and what isn’t How much you can deduct against your ordinary income if you've already used up all your gains The deadlines for tax-loss harvesting And finally, whether you can retroactively apply crypto losses on tax gains you’ve paid for in previous years Sponsors Veil Project Veil defines itself as ‘privacy without compromise’ — providing anonymity through a combination of technologies like RingCT. Having launched this year with over $1 million in seed funding, Veil boasts an experienced team, including members working on Ravencoin, PIVX, and more. Before its launch, the Veil team released the X16RT mining algorithm, which has been adopted by projects seeking resistance to ASICs and FPGAs. Veil’s hybrid Proof-of-Work & Proof-of-Stake consensus lets users mine the coin, stake or both. Veil states that staking allows Veil users to earn rewards anonymously by holding coins in their wallets. Find Veil on leading data feeds like Nomics, CoinMarketCap, Blockfolio, & CoinGecko. To learn more about Veil, check out their website here. Nomics’s Cryptocurrency Market Data API The Nomics API offers squeaky clean and normalized primary source trade data offered through fast and modern endpoints. Instead of having to integrate with several crypto exchanges, you can get everything through one screaming fast fire hose. If you found that you or your developer have to spend too much time cleaning up and maintaining datasets & ingesting market cap data, instead of identifying opportunities. Or if you’re tired of interpolated data and want raw primary source trades delivered simply and consistently with top-notch support in SLAs, then check us out here.

Flippening - For Crypto Investors
Investing in Privacy-Centric Cryptoassets w/ Jordan Clifford from Scalar Capital, Sponsored by Veil Project - (Ep. 0041)

Flippening - For Crypto Investors

Play Episode Listen Later Apr 22, 2019 81:02


In this episode, we explore privacy coin investing with our guest, Jordan Clifford, Co-founder and Managing Director at Scalar Capital. Before Scalar, Jordan was a lead growth engineer at Coinbase and a business analyst at Capital One. Hear Jordan & Clay discuss the fungibility of cryptoassets, the privacy coin landscape, and how macrotrends in society will lead to increased interest in privacy-centric cryptoassets. In this episode we discuss: How the Cyprus financial crisis in 2013 led Jordan (as well as many others) into exploring Bitcoin Why everyone should read the "Cypherpunk's Manifesto" How easy it is for companies and governments to trace your transaction history on the blockchain Why privacy matters The fungibility implications for cryptocurrencies Why privacy is the main focus of Scalar Capital How privacy coins empower individuals to custody their own assets Where privacy-centric cryptoassets will catch fire How people will pay more attention to their own privacy and therefore interest in privacy coins will also grow Why Monero stands out above the rest in the privacy coin landscape How mandatory privacy works and why it may be holding back Monero from wider adoption How ring signatures work Why JP Morgan is looking to use some of the technology found in Zcash Why Monero has a larger market cap even though Zcash is more popular Who the biggest threats are to Monero and Zcash (you might be surprised) The "instamine" issue on the Dash ecosystem Why Jordan is excited about decentralized exchanges Why more institutional involvement in cryptoassets is inevitable Why Schnorr signatures are a game changer for privacy Sponsors Veil Project Veil defines itself as ‘privacy without compromise’ — providing anonymity through a combination of technologies like Zerocoin and RingCT. Having launched this year with over $1 million in seed funding, Veil boasts an experienced team, including members working on Ravencoin, PIVX, and more. Before its launch, the Veil team released the X16RT mining algorithm, which has been adopted by projects seeking resistance to ASICs and FPGAs. Veil’s hybrid Proof-of-Work & Proof-of-Stake consensus lets users mine the coin, stake with Zerocoin, or both. Veil states that staking with Zerocoin allows Veil users to earn rewards anonymously by holding coins in their wallets. Find Veil on leading data feeds like Nomics, CoinMarketCap, Blockfolio, & CoinGecko. To learn more about Veil, check out their website here. Nomics’s Cryptocurrency Market Data API The Nomics API offers squeaky clean and normalized primary source trade data offered through fast and modern endpoints. Instead of having to integrate with several crypto exchanges, you can get everything through one screaming fast fire hose. If you found that you or your developer have to spend too much time cleaning up and maintaining datasets & ingesting market cap data, instead of identifying opportunities. Or if you’re tired of interpolated data and want raw primary source trades delivered simply and consistently with top-notch support in SLAs, then check us out here.

CryptochainX
CCX011 - Monero 101 - What, Why and How

CryptochainX

Play Episode Listen Later Sep 19, 2018 16:19


Monero is truly anonymus and untraceable cryptocurrency that uses three stealth technologies to protect the sender and the receiver. The three technologies that Monero uses to accomplish this are: Ring signatures, RingCT or Ring Confidential Transactions, Stealth address

Superior Coin Podcast
Crypto Scams Alert

Superior Coin Podcast

Play Episode Listen Later Feb 21, 2018 3:37


A little info about scams with crypto and how to stay away from them.Superior Coin is a secure, private, untraceable currency. Unlike many crypto currencies that are derivatives of Bitcoin, Superior Coin is based on the CryptoNote protocol and possesses significant algorithmic differences relating to blockchain obfuscation. Superior Coins main emission curve will have issued about 1.5 billion coins to be mined in over 30+ years. Superior Coin protects privacy in three ways for all transactions on the network: 1 ring signatures hide the sending address, 2 RingCT hides the amount of the transaction, and 3 stealth addresses hide the receiving address of the transaction.http://superior-coin.comhttp://superior-coin.net

Superior Coin Podcast
Crypto Scams Alert

Superior Coin Podcast

Play Episode Listen Later Feb 20, 2018 3:37


A little info about scams with crypto and how to stay away from them.Superior Coin is a secure, private, untraceable currency. Unlike many crypto currencies that are derivatives of Bitcoin, Superior Coin is based on the CryptoNote protocol and possesses significant algorithmic differences relating to blockchain obfuscation. Superior Coins main emission curve will have issued about 1.5 billion coins to be mined in over 30+ years. Superior Coin protects privacy in three ways for all transactions on the network: 1 ring signatures hide the sending address, 2 RingCT hides the amount of the transaction, and 3 stealth addresses hide the receiving address of the transaction.http://superior-coin.comhttp://superior-coin.net

Superior Coin Podcast
Superior Coin CEO Explains Tasks on Kryptonia

Superior Coin Podcast

Play Episode Listen Later Feb 13, 2018 9:41


Come join us today at https://Kryptonia.io and Get Free SuperiorCoin for joining. Sponsor your first task and get others to help you promote your business. Info at BitcoinTalk https://bitcointalk.org/index.php?topic=2088169.0Facebook here https://www.facebook.com/TheSuperiorCoin/http://Superior-coin.comSuperior Coin is a secure, private, untraceable currency. Unlike many crypto currencies that are derivatives of Bitcoin, Superior Coin is based on the CryptoNote protocol and possesses significant algorithmic differences relating to blockchain obfuscation. Superior Coins main emission curve will have issued about 1.5 billion coins to be mined in over 30+ years. Superior Coin protects privacy in three ways for all transactions on the network: 1 ring signatures hide the sending address, 2 RingCT hides the amount of the transaction, and 3 stealth addresses hide the receiving address of the transaction.http://superior-coin.net

Superior Coin Podcast
Superior Coin CEO Explains Tasks on Kryptonia

Superior Coin Podcast

Play Episode Listen Later Feb 13, 2018 9:41


Come join us today at https://Kryptonia.io and Get Free SuperiorCoin for joining. Sponsor your first task and get others to help you promote your business. Info at BitcoinTalk https://bitcointalk.org/index.php?topic=2088169.0Facebook here https://www.facebook.com/TheSuperiorCoin/http://Superior-coin.comSuperior Coin is a secure, private, untraceable currency. Unlike many crypto currencies that are derivatives of Bitcoin, Superior Coin is based on the CryptoNote protocol and possesses significant algorithmic differences relating to blockchain obfuscation. Superior Coins main emission curve will have issued about 1.5 billion coins to be mined in over 30+ years. Superior Coin protects privacy in three ways for all transactions on the network: 1 ring signatures hide the sending address, 2 RingCT hides the amount of the transaction, and 3 stealth addresses hide the receiving address of the transaction.http://superior-coin.net