-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cohort Refresh – research (PSS) & product implications + validation #70
Comments
Discussion/Update Nov 30th Dynamic Committees
Maximizing collusion friction
Availability
Cost of cohort refresh
Long-term commitment to network & overall node population
Statefulness baggage
Collusion orchestration friction
@jMyles thanks for your live-noting, I've included lots of your sentences here ^ |
Notes from @jMyles: Justin Myles Holmes — Today at 3:42 PM (Though I want to say, I think that it is confusing to call DKG participants "Ursula") (Perhaps to put it another way: a failing subset becomes a problem not only for service delivery, but because at a certain size it also makes refresh unavailable) We may of course want to make this difficult or impossible, or we may want to make it easy, or we may want to make this a tuneable parameter. Among the discussion he sees arising from this: Of course the core impetus is unbinding. But is there also a reason to carve forward-compatibility with refresh by fiat of the original "summoner"? I'll point out that a malicious node may choose to respond properly to a challenge, but still pretend to be offline at service time. After all, is availability even a near-term concern with respect to rollout? We don't necessarily need to solve that to push this thing out the door. (I'm not sure I agree.) @arj points out that there are differences insofar as slashing or another disincentive is needed to reduce incidence of the latter, and that this introduces complexity. @dnunez points out that, slashing aside, the cryptological machinery needed to replace a member of a cohort appears to be identical. @arj agrees, and clarifies that his thrust is to point out that the detection and incentive structure of unlawful disappearance (let's say "truancy"?) is a bigger problem that doesn't need to be solved in very near-term. @dnunez agrees. @arj agrees, and goes further to point out that random beacon utilization in sampling has other benefits, known and unknown. He carefully tip-toes into the notion that unbinders need to cover the cost of cohort refresh arising from their departure. piotr — Today at 4:28 PM Justin Myles Holmes — Today at 4:32 PM @arj: what burdens does state maintenance introduce? @dnunez: At a minimum, it means changing from mere custody of a secret to actually baking up the results of a runtime on a regular basis, etc. |
Envisaged (unvalidated) prompts for share recovery/refresh and initiation of DKG ceremony: (1) Orderly/natural staker unbonding (2) Inactive node (3) Application-prompted cohort refresh for increased collusion-resistance & redundancy (also to mitigate against the reduced redundancy/diversity of DKG & Decryption cohorts being the same) (4) Emergency/safety Corner cases: *confirmActivity but customizable and potentially incurring a higher fee, useful for cases where downside of non-responsiveness is high |
Relevant comment in #26 (comment) |
No description provided.
The text was updated successfully, but these errors were encountered: