-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reduced-complexity DKG #132
Comments
https://eprint.iacr.org/2023/992 relevant. |
https://eprint.iacr.org/2024/876 achieves O(1) per-party upload/download. For our use case, it'd be O(1) upload with O(n) download (ignoring the complexity of gossip and Tendermint). This would let us greatly reduce max Tributary TX sizes (tightening our DoS resilience). It does have a constant round complexity (comparable to current) as well. Assuming the academia holds up, it should be the clear-winner unless the constant size ends up as several kB? |
The one-round DKG (#589) we have now is quite good, despite still being linear. O(1) code via experimental lattice cryptography can definitely take a backseat. |
While this can still count as a long-term goal, the current DKG is great. I don't expect a less-bandwidth robust DKG, with cryptography we're able to implement and willing to use, to come any time soon and it's definitely no longer a priority. |
https://eprint.iacr.org/2022/1389.pdf details a DKG which they claim runs in O(n) without faults, yet in O(n log n) with arbitrary faults.
The existing DKG operates in O(n^2), and moving to O(n) is possible yet while introducing malleability which presumably violates the safety of the protocol.
The transformation in this paper is proven to be correct.
While this details a network protocol, which we don't need as we report coordination back to Substrate which uses Tendermint, the cryptographic performance gain would be massive. For 500 validators, it'd move from 250k point muls to just 4483 (assuming log2).
The text was updated successfully, but these errors were encountered: