Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Possible proofs for fungible assets pruning in RGB-20 #28

Open
dr-orlovsky opened this issue May 8, 2020 · 0 comments · Fixed by #136
Open

Possible proofs for fungible assets pruning in RGB-20 #28

dr-orlovsky opened this issue May 8, 2020 · 0 comments · Fixed by #136
Assignees
Labels
enhancement New feature or request proposal New proposals [RGB] Specs related to client-validated state management system

Comments

@dr-orlovsky
Copy link
Member

There are some possibilities to make asset pruning verifiable; here I try to summarize them.

Zero-knowledge proofs

The proofs can be made with probabilistic checkable proofs procedure - or, potentially with bulletproofs and these proofs can be included as a binary data state attached to prune seal into pruning state transition.

The issuer during the pruning operation does usual verification process for the pruned assets (confidential amount verification and anchor verification). This process is then encoded as a Simplicity script with inputs used at each of its steps. Next, the issuer computes hash this script with its data and uses it to construct probabilistic checkable proof for 1 to 10% of the proof work (or a bulletproof). This part is serialized and supplied with prune state transition, so any party having these data may verify that the issuer was honest during the pruning process and had not created an asset inflation.

Pruning audit

Another alternative may be that the issuer adds to the pruning transition signatures of independent auditors confirming the correctness of the pruning operation. These auditors verify the complete pruning process with all source data.

The auditors may be

  • pre-defined in the issue procedure
  • parties selected by the issuer during the pruning
  • randomly selected from a set of existing public auditors using some sort of Fiat-Shamir heuristic (like we use some hash of the pruning transition created in such a way that the issuer can not maleate it)

In the latter case we may even use future RGB reputation schema to define the set of auditors in a decentralized fashion

@dr-orlovsky dr-orlovsky added enhancement New feature or request [RGB] Specs related to client-validated state management system proposal New proposals labels May 8, 2020
@dr-orlovsky dr-orlovsky added this to the RGB core: drafts milestone May 8, 2020
dr-orlovsky added a commit that referenced this issue Oct 10, 2020
@dr-orlovsky dr-orlovsky modified the milestones: RGBv1, RGB schemata v1 Jan 23, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request proposal New proposals [RGB] Specs related to client-validated state management system
Projects
Status: In review
Development

Successfully merging a pull request may close this issue.

7 participants