roadmap/roadmap/vac/dr/consensus/nomos/stake-privacy-timing-attack...

116 lines
16 KiB
HTML
Raw Normal View History

2023-09-15 14:19:46 +00:00
<!DOCTYPE html>
2023-09-15 14:23:40 +00:00
<html><head><title>Network Privacy Stack - Stakeholder Privacy</title><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1.0"/><meta property="og:title" content="Network Privacy Stack - Stakeholder Privacy"/><meta property="og:description" content="vac:dr:consesus:nomos:stake-privacy-timing-attacks § %%{ init: { &amp;#039;theme&amp;#039;: &amp;#039;base&amp;#039;, &amp;#039;themeVariables&amp;#039;: { &amp;#039;primaryColor&amp;#039;: &amp;#039;#BB2528&amp;#039;, &amp;#039;primaryTextColor&amp;#039;: &amp;#039;#fff&amp;#039;, &amp;#039;primaryBorderColor&amp;#039;: &amp;#039;#7C0000&amp;#039;, &amp;#039;lineColor&amp;#039;: &amp;#039;#F8B229&amp;#039;, &amp;#039;secondaryColor&amp;#039;: &amp;#039;#006100&amp;#039;, &amp;#039;tertiaryColor&amp;#039;: &amp;#039;#fff&amp;#039; } } }%% gantt tickInterval 1month dateFormat YYYY-MM-DD section Status Stake Privacy - Timing Attacks: status: 0% CC: Moh Description § This milestone comprises component 3 of the Nomos network pivacy stack in the context of consensus privacy: The main goal of this work is finding in-protocol (carnot) mechanisms to solve the problem of timing attacks Upper layer protections of the network from the sender: Simplest solution to prevent attacks to private PoS: minimum age of transaction for inclusion Certain types of timing attacks and network observation to identify high stake participants are already being worked on at the network level."/><meta property="og:image" content="https://roadmap.logos.co/static/og-image.png"/><meta property="og:width" content="1200"/><meta property="og:height" content="675"/><link rel="icon" href="../../../../../static/icon.png"/><meta name="description" content="vac:dr:consesus:nomos:stake-privacy-timing-attacks § %%{ init: { &amp;#039;theme&amp;#039;: &amp;#039;base&amp;#039;, &amp;#039;themeVariables&amp;#039;: { &amp;#039;primaryColor&amp;#039;: &amp;#039;#BB2528&amp;#039;, &amp;#039;primaryTextColor&amp;#039;: &amp;#039;#fff&amp;#039;, &amp;#039;primaryBorderColor&amp;#039;: &amp;#039;#7C0000&amp;#039;, &amp;#039;lineColor&amp;#039;: &amp;#039;#F8B229&amp;#039;, &amp;#039;secondaryColor&amp;#039;: &amp;#039;#006100&amp;#039;, &amp;#039;tertiaryColor&amp;#039;: &amp;#039;#fff&amp;#039; } } }%% gantt tickInterval 1month dateFormat YYYY-MM-DD section Status Stake Privacy - Timing Attacks: status: 0% CC: Moh Description § This milestone comprises component 3 of the Nomos network pivacy stack in the context of consensus privacy: The main goal of this work is finding in-protocol (carnot) mechanisms to solve the problem of timing attacks Upper layer protections of the network from the sender: Simplest solution to prevent attacks to private PoS: minimum age of transaction for inclusion Certain types of timing attacks and network observation to identify high stake participants are already being worked on at the network level."/><meta name="generator" content="Logos Roadmaps"/><link rel="preconnect" href="https://fonts.googleapis.com"/><link rel="preconnect" href="https://fonts.gstatic.com"/><link href="../../../../../index.css" rel="stylesheet" type="text/css" spa-preserve/><link href="https://cdn.jsdelivr.net/npm/katex@0.16.0/dist/katex.min.css" rel="stylesheet" type="text/css" spa-preserve/><link href="https://fonts.googleapis.com/css2?family=IBM Plex Mono&amp;family=sans-serif:wght@400;700&amp;family=sans-serif:ital,wght@0,400;0,600;1,400;1,600&amp;display=swap" rel="stylesheet" type="text/css" spa-preserve/><script src="../../../../../prescript.js" type="application/javascript" spa-preserve></script><script type="application/javascript" spa-preserve>const fetchData = fetch(`../../../../../static/contentIndex.json`).then(data => data.json())</script></head><body data-slug="roadmap/vac/dr/consensus/nomos/stake-privacy-timing-attacks"><div id="quartz-root" class="page"><div id="quartz-body"><div class="left sidebar"><h1 class="page-title"><a href="../../../../..">Logos Collective Project Roadmaps</a></h1><div class="spacer mobile-only"></div><div class="search"><div id="search-icon"><p
2023-09-15 14:19:46 +00:00
<hr/>
<pre><code class="mermaid">%%{
init: {
'theme': 'base',
'themeVariables': {
'primaryColor': '#BB2528',
'primaryTextColor': '#fff',
'primaryBorderColor': '#7C0000',
'lineColor': '#F8B229',
'secondaryColor': '#006100',
'tertiaryColor': '#fff'
}
}
}%%
gantt
tickInterval 1month
dateFormat YYYY-MM-DD
section Status
2023-09-15 14:23:40 +00:00
Stake Privacy - Timing Attacks:
2023-09-15 14:19:46 +00:00
</code></pre>
<ul>
<li>status: 0%</li>
<li>CC: Moh</li>
</ul>
<h3 id="description">Description<a aria-hidden="true" tabindex="-1" href="#description" class="internal"> §</a></h3>
<p>This milestone comprises component 3 of the <a href="https://www.notion.so/Network-Privacy-Stack-2a2a86647d2a42ca9de6940c55f99851" class="external">Nomos network pivacy stack</a>
2023-09-15 14:22:36 +00:00
in the context of consensus privacy:</p>
2023-09-15 14:19:46 +00:00
<p>The main goal of this work is finding in-protocol (carnot) mechanisms to solve the problem of timing attacks</p>
2023-09-15 14:22:36 +00:00
<p>Upper layer protections of the network from the sender: Simplest solution to prevent attacks to private PoS: minimum age of transaction for inclusion</p>
2023-09-15 14:19:46 +00:00
<p>Certain types of timing attacks and network observation to identify high stake participants are already being worked on at the network level.
However, this problem should be considered at the PoS/consesus layer as well.</p>
<h4 id="more-info">more info<a aria-hidden="true" tabindex="-1" href="#more-info" class="internal"> §</a></h4>
<ul>
<li><a href="https://eprint.iacr.org/2021/409.pdf" class="external">paper: On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols</a></li>
</ul>
<p>From the abstract:</p>
<pre><code>[...] focus on anonymizing the
messages of the blockchain protocol, but suggest that potential identity leaks from the networklayer can be removed as well by employing anonymous broadcast channels.
In this work we show that this intuition is flawed.
</code></pre>
<p>Generally, our endeavor in stake privacy research centers on preserving the confidentiality of validator stakes.
By leveraging cryptographic techniques and innovative approaches, we aim to enhance the privacy and security of staking operations within the Carnot ecosystem.</p>
<p>Older docs:</p>
<ul>
<li>Hash-based Node Id encryption Hash-based-Node-Id-encryption-7bfb11941a6840c49bfe065f535877c9?pvs=24</li>
<li>Carnot PoS Discussion notion.so/Carnot-PoS-Discussion-f2ef371102f6433da81fb1b1b9213c2b?pvs=24</li>
</ul>
2023-09-15 14:22:36 +00:00
<p>Potential future solutions (outside the scope of this mile stone) comprise: proof of mixing + modifications to the base mixnet design. This seems like a difficult path, for long-term research if feasible.</p>
2023-09-15 14:19:46 +00:00
<h3 id="justification">Justification<a aria-hidden="true" tabindex="-1" href="#justification" class="internal"> §</a></h3>
<p>This is and important step towards achieving the Nomos privacy requirements.</p>
<h3 id="deliverables">Deliverables<a aria-hidden="true" tabindex="-1" href="#deliverables" class="internal"> §</a></h3>
<ul>
<li>specification</li>
</ul></article></div><div class="right sidebar"><div class="graph"><h3>Graph View</h3><div class="graph-outer"><div id="graph-container" data-cfg="{&quot;drag&quot;:true,&quot;zoom&quot;:true,&quot;depth&quot;:1,&quot;scale&quot;:1.1,&quot;repelForce&quot;:0.5,&quot;centerForce&quot;:0.3,&quot;linkDistance&quot;:30,&quot;fontSize&quot;:0.6,&quot;opacityScale&quot;:1}"></div><svg version="1.1" id="global-graph-icon" xmlns="http://www.w3.org/2000/svg" xmlnsXlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 55 55" fill="currentColor" xmlSpace="preserve"><path d="M49,0c-3.309,0-6,2.691-6,6c0,1.035,0.263,2.009,0.726,2.86l-9.829,9.829C32.542,17.634,30.846,17,29,17
s-3.542,0.634-4.898,1.688l-7.669-7.669C16.785,10.424,17,9.74,17,9c0-2.206-1.794-4-4-4S9,6.794,9,9s1.794,4,4,4
c0.74,0,1.424-0.215,2.019-0.567l7.669,7.669C21.634,21.458,21,23.154,21,25s0.634,3.542,1.688,4.897L10.024,42.562
C8.958,41.595,7.549,41,6,41c-3.309,0-6,2.691-6,6s2.691,6,6,6s6-2.691,6-6c0-1.035-0.263-2.009-0.726-2.86l12.829-12.829
c1.106,0.86,2.44,1.436,3.898,1.619v10.16c-2.833,0.478-5,2.942-5,5.91c0,3.309,2.691,6,6,6s6-2.691,6-6c0-2.967-2.167-5.431-5-5.91
v-10.16c1.458-0.183,2.792-0.759,3.898-1.619l7.669,7.669C41.215,39.576,41,40.26,41,41c0,2.206,1.794,4,4,4s4-1.794,4-4
s-1.794-4-4-4c-0.74,0-1.424,0.215-2.019,0.567l-7.669-7.669C36.366,28.542,37,26.846,37,25s-0.634-3.542-1.688-4.897l9.665-9.665
C46.042,11.405,47.451,12,49,12c3.309,0,6-2.691,6-6S52.309,0,49,0z M11,9c0-1.103,0.897-2,2-2s2,0.897,2,2s-0.897,2-2,2
S11,10.103,11,9z M6,51c-2.206,0-4-1.794-4-4s1.794-4,4-4s4,1.794,4,4S8.206,51,6,51z M33,49c0,2.206-1.794,4-4,4s-4-1.794-4-4
s1.794-4,4-4S33,46.794,33,49z M29,31c-3.309,0-6-2.691-6-6s2.691-6,6-6s6,2.691,6,6S32.309,31,29,31z M47,41c0,1.103-0.897,2-2,2
s-2-0.897-2-2s0.897-2,2-2S47,39.897,47,41z M49,10c-2.206,0-4-1.794-4-4s1.794-4,4-4s4,1.794,4,4S51.206,10,49,10z"></path></svg></div><div id="global-graph-outer"><div id="global-graph-container" data-cfg="{&quot;drag&quot;:true,&quot;zoom&quot;:true,&quot;depth&quot;:-1,&quot;scale&quot;:0.9,&quot;repelForce&quot;:0.5,&quot;centerForce&quot;:0.3,&quot;linkDistance&quot;:30,&quot;fontSize&quot;:0.6,&quot;opacityScale&quot;:1}"></div></div></div><div class="backlinks"><h3>Backlinks</h3><ul class="overflow"><li><a href="../../../../../roadmap/vac/dr/overview" class="internal">Deep Research Service Unit</a></li></ul></div></div></div><footer><hr/><p>Created by Logos with <a href="https://quartz.jzhao.xyz/">Quartz v4.0.8</a>, © 2023</p><ul><li><a href="https://github.com/logos-co/roadmap">GitHub</a></li><li><a href="https://discord.com/invite/logos-state">Discord Community</a></li></ul></footer></div></body><script type="application/javascript">// quartz/components/scripts/quartz/components/scripts/callout.inline.ts
function toggleCallout() {
const outerBlock = this.parentElement;
outerBlock.classList.toggle(`is-collapsed`);
const collapsed = outerBlock.classList.contains(`is-collapsed`);
const height = collapsed ? this.scrollHeight : outerBlock.scrollHeight;
outerBlock.style.maxHeight = height + `px`;
let current = outerBlock;
let parent = outerBlock.parentElement;
while (parent) {
if (!parent.classList.contains(`callout`)) {
return;
}
const collapsed2 = parent.classList.contains(`is-collapsed`);
const height2 = collapsed2 ? parent.scrollHeight : parent.scrollHeight + current.scrollHeight;
parent.style.maxHeight = height2 + `px`;
current = parent;
parent = parent.parentElement;
}
}
function setupCallout() {
const collapsible = document.getElementsByClassName(
`callout is-collapsible`
);
for (const div of collapsible) {
const title = div.firstElementChild;
if (title) {
title.removeEventListener(`click`, toggleCallout);
title.addEventListener(`click`, toggleCallout);
const collapsed = div.classList.contains(`is-collapsed`);
const height = collapsed ? title.scrollHeight : div.scrollHeight;
div.style.maxHeight = height + `px`;
}
}
}
document.addEventListener(`nav`, setupCallout);
window.addEventListener(`resize`, setupCallout);
</script><script type="module">
import mermaid from 'https://cdn.jsdelivr.net/npm/mermaid/dist/mermaid.esm.min.mjs';
const darkMode = document.documentElement.getAttribute('saved-theme') === 'dark'
mermaid.initialize({
startOnLoad: false,
securityLevel: 'loose',
theme: darkMode ? 'dark' : 'default'
});
document.addEventListener('nav', async () => {
await mermaid.run({
querySelector: '.mermaid'
})
});
</script><script src="https://cdn.jsdelivr.net/npm/katex@0.16.7/dist/contrib/copy-tex.min.js" type="application/javascript"></script><script src="../../../../../postscript.js" type="module"></script></html>