Bitcoin Research — The Creation of Bitcoin.....

A brief history of the Monero development (Part I)

or a struggle for anonymity and confidentiality of blockchain transaction.
The issues of privacy of electronic currency faced researchers and developers for a long time, long before Bitcoin. In 1991, Tatsuaki Okamoto and Kazuo Ohta from the NTT research laboratory (Japan's largest telecommunications company) introduced 6 criteria for an ideal e-currency, including privacy: "relationship between the user and his purchases must be untraceable by anyone". Nicholas van Saberhagen, an anonymous author behind the work on the CryptoNote protocol, which formed the basis of Monero, in December 2012 summarized these 6 criteria to two specific properties:
Untraceability: for every incoming transaction, all possible senders are equally likely.Unlinkability: for any two outgoing transactions, it is impossible to prove that they were sent to the same person.
None of the other properties are characteristic of Bitcoin, since all transactions are broadcasted publicly. Of course, by the time this work was written, various tumblers made it possible to combine outputs of several transactions and send them through some intermediate address. Also, by that time, some protocols based on the zero-knowledge proof were known, but at that time such evidence was large enough to make them impractical to use.
What was proposed to tackle the issues: firstly, each transaction was signed on behalf of the group, not the individual, as in BTC. To do this, we used the option of an electronic digital signature called "Ring Signature" (further development of the so-called "Group Signature"). However, when implementing a completely anonymous ring signature, a (very high) probability of double spending of coins arose, and therefore the so-called linkable anonymity primitive was taken, which was implemented through a one-time-key mechanism (i.e., when creating each new transaction, the group key changes).
Essentially, although it's certainly worth noting that the CryptoNote implementation used a different scheme of elliptical curves (EdDSA instead of ECDSA, as a result, an elliptic curve with a different equation was used, etc.).
Anonymity achieved, but what about privacy? RingCT to the rescue
You know how it happens: everything seems to be there, but something is missing. The problem with the original CryptoNote protocol was that the user balances were not hidden, and thus, it was possible to analyze the blockchain and deanonymize the members of the group who signed the transaction. An additional problem with hiding balances is that with simple encryption of balances, it is not possible to reach a consensus on whether coins were produced from the thin air or not.
To solve this problem, the developer Shen Noether from Monero Research Lab proposed the use of the Pederson Commitment, which allows the prover to calculate the obligation for the amount without disclosing it and being unable to change it.
Short explanation from Monero Wiki:
As long as the encrypted output amounts created, which include an output for the recipient and a change output back to the sender, and the unencrypted transaction fee is equal to the sum of the inputs that are being spent, it is a legitimate transaction and can be confirmed to not be creating Monero out of thin air.
Thus, it is possible to obtain a ring confidential transaction (hence the name). And, the inquisitive reader will ask, what is wrong this time?
The problem is one, but twofold. On the one hand, the size of the transaction increases with RingCT, which does not have the best effect on scalability and transaction fees. Besides, again, due to the large size of the signature, the number of possible subscribers n is limited. So, the n value in the official software of Monero wallet is from 5 to 20 by default. As a result, the sender anonymity for RingCT1.0 is at most 1 out of 20.
To be continued...
submitted by CUTcoin to cutc0in [link] [comments]

1996 NSA paper on digital currency - Bitcoin?

Hmmm.... NSA wrote a paper on digital currency in 1996
http://groups.csail.mit.edu/mac/classes/6.805/articles/money/nsamint/nsamint.htm
there's someone named Tatsuaki Okamoto who was involved, the name is close to Satoshi Nakamoto when arranged, an anagram if you will....
As many of you know NSA is also behind SHA-256 which Bitcoin uses
"SHA-2 is a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512) designed by the U.S. National Security Agency (NSA) ..."
www.wikipedia.org/wiki/SHA-2
submitted by FlyGuy74 to Bitcoin [link] [comments]

2016WJ Final 1A 06 Tatsuaki Okamoto IOHK  Ouroboros next steps The Truth about Bitcoin? Renowned Cryptographer Says His Patent Was an Obstacle for ... IOHK  Consensus protocols - efficiency

Bitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know ... Tatsuaki okamoto bitcoin wiki der-dorflehrer.de. Flatex Zertifikat Auf Bitcoin . Online mit Kryptowährung Geld verdienen - so geht's. Reich werden im Internet – 5 unbequeme Wahrheiten, die dir keiner sagt. Aktienhandelssoftware schweiz. Ein-paar-optionen bei bdswiss was steckt dahinter? Unabhängige Beratung rund um Staubsauger Roboter . Wie kann ich heute online geld verdienen? Bitcoin ... Bitcoin architecture The NSA report goes deeply into the challenges a crypto currency faces and lists the various security and implicated regulatory risks. Both from the point of view from regulators and developers of such schemes. Amazingly, a key writer of the report is called Tatsuaki Okamoto. In the Bitcoin community this has been picked up as remarkably similar to Satoshi Nakamoto, the ... The issues of privacy of electronic currency faced researchers and developers for a long time, long before Bitcoin. In 1991, Tatsuaki Okamoto and Kazuo Ohta from the NTT research laboratory (Japan's largest telecommunications company) introduced 6 criteria for an ideal e-currency, including privacy: "relationship between the user and his purchases must be untraceable by anyone". Bitcoin is a question that can only be answered by a question unless someone generates us the private key to unlock it. It was carefully designed that way, just like bitcoin itself. In the end we only know one thing for sure….Bitcoin was created by the cypherpunks. The Real Bitcoin wiki:

[index] [24710] [12363] [2090] [37746] [8492] [25836] [23836] [35274] [39426] [20979]

2016WJ Final 1A 06 Tatsuaki Okamoto

One of the researchers they referenced was Tatsuaki Okamoto... PART 2/4 - 'Crypto Market': Most of the crypto market is a scam. By the way, this was predicted very early on in the Bitcoin Talk ... Tuesday, December 6 9:00-9:50 Invited Lecture II Hoeteck Wee, “Advances in Functional Encryption” Chair: Tatsuaki Okamoto 9:55-10:20 Invited to JoC Nonlinear Invariant Attack –Practical ... This video is unavailable. Watch Queue Queue. Watch Queue Queue He has also been a long-term visitor at the NTT Secure Plaftorm Laboratories working with Tatsuaki Okamoto and Masayuki Abe and at the Cryptography Group at Bar Ilan University working with Yehuda ... Tatsuaki Okamoto explains why his “electronic cash” patent might have presented an obstacle to Hal Finney in his ambition to create his own electronic curren...

#