BLUE
Profile banner
S
str👻d
@str4d.xyz
Cryptography, privacy, zero knowledge, Rust, gaming, hardware hackery, consumer of art. He/him. str4d.xyz abyssdomain.expert/@str4d twitter.com/str4d age18f63qx4gk8x7p4lfuwwglqcan7snvp406q5vmk26g9fmpe9c799qqzzr3w
9.9k followers337 following2.2k posts
Sstr4d.xyz

The discriminator acts like a blinding factor in a Pedersen commitment to the nickname (with 30 bits of possible entropy, which is then reduced down to a minimum of 7 bits due to their UX desire to pick a minimal-length discriminator), and then the hash itself acts like a full-width blinding factor.

2

THtjade273.bsky.social

Right, but I guess the question is “why do we want a Pedersen commitment to the nickname” Maybe some fun future feature that needs it for more zk proofs? Given the desire for a pedersen commitment, the design makes sense (hash prevents brute-forcing the nickname and discriminator independently)

1
Sstr4d.xyz

So I suspect the rationale here is privacy against the server. The server sees nickname hashes, but there are potentially multiple (nickname, discriminator) pairs that could produce the same nickname hash. Not perfect privacy like using a random full-width blinding factor, but probably sufficient.

0
Profile banner
S
str👻d
@str4d.xyz
Cryptography, privacy, zero knowledge, Rust, gaming, hardware hackery, consumer of art. He/him. str4d.xyz abyssdomain.expert/@str4d twitter.com/str4d age18f63qx4gk8x7p4lfuwwglqcan7snvp406q5vmk26g9fmpe9c799qqzzr3w
9.9k followers337 following2.2k posts