Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OutProofs are CanScanProofs for transparent-amount outputs #130

Open
kayabaNerve opened this issue Dec 5, 2024 · 0 comments
Open

OutProofs are CanScanProofs for transparent-amount outputs #130

kayabaNerve opened this issue Dec 5, 2024 · 0 comments

Comments

@kayabaNerve
Copy link

For an output one-time key of O = S + H(8rV)G, an adversary can send to S, V, and then can sample V', before calculating S' = O - H(8rV')G. While the transaction wasn't sent to this address, it can scan for it (at least, it can rebuild the output key, the view tag would have would have to be grinded) if anyone knew its private keys. It's unknown if any OutProof is for such a derived address or for the actually sent to address.

This doesn't allow faking a payment to a store. This does allow claiming a payment made to someone was made to someone else (a random address no one knows the keys for).

This doesn't immediately work for outputs with amount privacy. The amount decrypted will be gibberish, the randomness different, and the commitment won't line up. I'd have to double-check the exact applicability here (even when using amount privacy) with regards to main/sub addresses and upon collusion with the recipient (as then you do have leeway with coercing the view key as necessary). I'm not fully mapping this out as this is a quirk and a rabbit hole, but there's no known real-world use. I just wanted to ensure it's documented.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant