Author: @Álvaro Castro-Castilla

The general idea is to approach the protocol design as if we had infinite bandwidth for privacy. From there, ways to bring down network usage to practical levels can be designed, making use of our knowledge of network deanonymization to achieve adequate tradeoffs.

Objective

This design is focused on solving the one central problem of our privacy concerns: hiding who is the leader.

Contrary to previous approaches that are designed for generic and unpredictable traffic (such as Loopix), this attempts to use the following unique characteristics:

This design adheres to the requirements described here.

Threat model

We start from the point of view that the GPA (Global Passive Adversary) is not a good model for real world scenarios [See P. Syverson, “Why I’m Not an Entropist,” in Security Protocols XVII, 2013]. Instead, we consider an ad-hoc thread model that to the best of my knowledge is not yet formally defined (I would appreciate any help with defining it formally):

Protocol

1. Mempool

2. Block building