Skip to content

Commit 19e2993

Browse files
committed
Future work beginning
1 parent 81c8870 commit 19e2993

File tree

1 file changed

+26
-2
lines changed

1 file changed

+26
-2
lines changed

report/src/sections/09-future-works.tex

Lines changed: 26 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,5 +2,29 @@ \section{Future work}\label{sec:future-works}
22
In this section we will focus on where there is still room for improvement in the Whisk protocol.
33

44
The main modification from Curdleproofs to CAAUrdleproofs is the added flexibilty in choosing the shuffle size for Whisk.
5-
Hence, a topic to delve into in the future could be more structural modifications.
6-
As seen in~\autoref{sec:curdleproofs-weighted-inner-product-argument-modification-attempt}, we tried this, but found that we did not have time to follow through, as it seemed that significant structural changes were needed.
5+
Hence, a topic for future improvements could be proof structure modifications.
6+
The goal of this is to improve the protocol in all cases.
7+
Also in cases where the shuffle size is a power of two, for which Curdleproofs and CAAUrdleproofs show similar results.
8+
As seen in Appendix~\ref{app:curdleproofs-weighted-inner-product-argument-modification-attempt}, we tried to do this using~\glspl{wipa} instead of~\glspl{ipa}.
9+
Though, we found that there was not enough time to follow through, as it seemed that significant structural changes were needed for this change to be possible.
10+
11+
12+
Besides trying to make the proof faster, and the block overhead smaller, there are also calls for making the protocol more secure.
13+
Specifically, work has already begun trying to make Curdleproofs post-quantum secure~\cite{pqwhisk}.
14+
In this work, they make use of~\gls{csidh}~\cite{10.1007/978-3-030-03332-3_15}.
15+
Isogeny-based cryptography is based on maps between elliptic curves.
16+
Using isogenies, a hard problem comes up, namely the~\gls{gaip}.
17+
\begin{definition}[Group Action Inverse Problem (GAIP)]
18+
Given a curve $E$, with $End(E)=O$, find an ideal $a\subset O$ such that $E=[a]E_0$
19+
\end{definition}
20+
Using this problem, an almost one to one conversion into using post-quantum cryptography can be done on Whisk, as shown by Sanso~\cite{pqwhisk}.
21+
At the moment, though, there does not exist a~\gls{nizk} proof of shuffle based on isogenies.
22+
23+
24+
With Whisk, a list of upcoming proposers is still chosen and published some time before they are needed for duty.
25+
But because upcoming proposers are published as trackers that only the chosen validator can open and prove ownership of, attacks such as~\gls{dos} attacks are a lot harder to accurately perform.
26+
27+
Though, as found by Heimbach et al.~and confirmed by ourselves, the execution of the~\gls{dos} attack is only half the attack~\cite{heimbach2024deanonymizingethereumvalidatorsp2p,ouroldpaper}.
28+
Even if the blockchain is using Whisk, it is still possible for an adversary to gather and de-anonymize validator IP addresses only by running a node on the network.
29+
A sustainable solution for this therefore needs to be found.
30+
Currently, ideas such as $k$-anonymity, where nodes group together in $k$-size groups and randomize who sends routine messages to the network, have been proposed.

0 commit comments

Comments
 (0)