The Matter Of Privacy

Among Us

Mi'kail Eli'yah

--

Note: Please refer acronym list.

1. Anonymous Signing
1.1. Multi-Signatures or Threshold Signatures
1.2. Group Signatures
1.3. Ring Signatures

2. Blinding
2.1. Homomorphic Encryption
2.2. PSI

3. Proof Systems
3.1. ZKP
3.1.1. Pedersen Commitments
3.1.2. Bulletproofs
3.1.3. ZK Challenge-and-Response
3.1.4. ZK Authentication
3.1.5. ZK Mutual Authentication

4. Anonymization
4.1. Stealth Addresses

5. Use Case Scenarios

6. The Matter Of Privacy
6.1. Privacy: What is it?
6.2. How is Privacy Assured?

Missing features for privacy

Privacy is in the matter to determine the right-to-know and the need-to-know, as well as the matter to determine who to trust and how to trust. The crux of utility and application is in the matter of proof, with the consideration of privacy, and yet the matter of proof that privacy is assured.

As all proofs are based on Assertions, how would security solutions architects assured A6?

Anonymous Signing

Multi-Signatures or Threshold Signatures

Multi-signature (Itakura and Nakamura, 1983) schemes reveal data only when certain conditions are met, i.e. an adequate number of entities (e.g., k of N, where k may be 3, N may be 5) authorize. Another option may be threshold signature or presentation, e.g. Schnorr signature, SSS (Shamir Secret sharing (1979)). """ Schnorr signature method to aggregate signers (secp256k1)
G := base point on the curve.
[Sign]
A takes his private key, a random value (r_i) and a message (M), and produces a signature: (R,s ).
< Keys generation >:
1. A generates private key of (x_1) and a public key (X_1):
X_1 = x_1 * G
2. B generates private key (x_2) and a public key (X_2):
X_2 = x_2 * G

--

--