-
Notifications
You must be signed in to change notification settings - Fork 83
Open
Description
This is an effort to construct a list of open research question relevant to Monero, as discussed in a recent MRL meeting. The purpose of this list is to:
- Prioritize MRL efforts
- Inform external researchers of key Monero questions
- Maybe serve as a basis for Request For Proposal-style grantmaking in the future
This effort was in part inspired by a similar list put together by Grin.
Cat = Category. The categories are Privacy, Scaling, Decentralization, and User experience.
Imp = Impact, a subjective 1-10 measure of how important resolving the question is for Monero's goals.
Dif = Difficulty, a subjective 1-10 measure of how difficult resolving the question may be.
A collection of Monero-related research papers is available at MoneroResearch.info.
This list is a work in progress. Please give feedback below, including additional questions that should be added.
| Question | Cat | Imp | Dif | Work in Progress | Links |
|---|---|---|---|---|---|
| Increase ring size | P,S | 8 | 8 | Seraphis; Triptych | #91; #92 |
| Decoy selection algorithm (DSA) that closely matches the real spend age distribution | P | 8 | 6 | OSPEAD; Dynamic; Nonparametric | #93; #86 |
| Advisability and feasibility of enforcement of DSA at the node and/or consensus level | P,D | 6 | 4 | #87 | |
| Advisability and implementation of binning for the DSA | P | 6 | 4 | @j-berman 's implementation | #84; #88 |
| Decoy selection when transitioning transaction types | P | 6 | 5 | ■ | |
| Advisability of churning and churning best practices | P,S,U | 7 | 5 | ||
| Defend against the Overseer Attack | P | 7 | 9 | ■ | |
| Defend against the Flashlight/Poisoned Outputs/EAE/EABE Attack | P | 7 | 9 | ■; ■; ■ | |
| Defend against the Tainted Dust Attack | P | 7 | 9 | ■ | |
| Cross-ring output collisions: implications and solutions | P | 2 | 3 | ■ | |
| Faster syncing of non-custodial wallets | S,U | 7 | 8 | View Tags | #73; ■ |
| Reducing or eliminating 10 block lock with acceptable drawbacks | S,U | 9 | 7 | #85; #95; #102; ■; ■ | |
| Increase mining decentralization | S,D | 7 | 7 | p2pool; SolOptXMR | |
| Determine if miners increasing block size is incentive-compatible from a game theory perspective | S,D | 5 | 6 | ■; ■; ■; ■ | |
| Payment channels | S,U | 6 | 7 | Grease | ■; ■; ■; ■; ■ |
| Layer 2 solutions | P,S,D,U | 8 | 9 | ||
| Atomic swaps with every coin ever | D,U | 8 | 8 | BTC; ETH; BCH | ■; ■; ■; ■; ■ |
| Pruning of spent outputs | S,D | 7 | 8 | #69 zcash/zcash#4946 | |
| Private, untraceable transactions without ring signatures, but with acceptable tradeoffs | P | 10 | 10 | FCMP | ■; #100 |
| Post-quantum Security & Privacy | P | 9 | 10 | ■; ■; ■; #105 |
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels