Skip to content

Commit

Permalink
init polycript file
Browse files Browse the repository at this point in the history
  • Loading branch information
PieWol committed Jan 30, 2024
1 parent 5cb84cd commit 01140a5
Showing 1 changed file with 32 additions and 0 deletions.
32 changes: 32 additions & 0 deletions evaluations/Polycript_1_PieWol.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
# Evaluation


- **Status:** TODO
- **Application Document:** https://github.com/w3f/Grants-Program/blob/1ece13a88b0e60b4e177acbe2653275b6d3c70e5/applications/distributed_cryptography_for_polkadot_wallets.md
- **Milestone:** 1
- **Kusama Identity:** [HHEEgVzcqL3kCXgsxSfJMbsTy8dxoTctuXtpY94n4s8F4pS](https://kusama.subscan.io/account/HHEEgVzcqL3kCXgsxSfJMbsTy8dxoTctuXtpY94n4s8F4pS)
- **Previously successfully merged evaluation:** Calamar M3


### Milestone 1 – Research on cryptographic algorithms

- **Estimated duration:** 1.5 months
- **FTE:** 1.25 FTE
- **Costs:** 18,000 USD

| Number | Deliverable | Accepted | Evluation Notes |
| -----: | ----------- | ------------- |
| **1.0a.** | Copyright and Licenses | CC BY 4.0 |
| **1.0b.** | Documentation/Tutorial | As we do not plan on delivering code we will not provide documentation in that sense. The delivered report at the end of this milestone will serve as documentation. |
| **1.0c.** | Methodology | This milestone will be achieved mainly by compiling and reading relevant literature as well as internal talks and discussions. We may involve interviews with external parties such as web3 researchers and/or wallet developers, specifally for Task 1.2. Our results can be verified through the report delivered in this milestone. |
| **1.0d.** | Infrastructure | We expect that all our work and deliverables for this milestone can be reviewed and understood without need for specific infrastructure or software except from a web browser. |
| **1.0e.** | Article | We will deliver a short report that contains a list of academic papers that we studied and a discussion on which cryptographic schemes are most suitable for our goal of building Threshold BIP32 wallets for Schnorr. The report will contain the results from Tasks 1.1 to 1.3. The report is mainly for internal use and hence will be approx. 2 pages. We will make sure that the report is easiliy accessible to the reviewers and the community. |
| **1.1.** | Investigation into threshold Schnorr protocols | We will investigate the current state of the art in threshold Schnorr protocols that are suitable to work with the Schnorrkel/Ristretto environment. We will evaluate them according to efficiency (round complexity, communication complexity) and security. For the latter, important criteria are: (1) static vs. adaptive corruption, (2) corruption threshold, (3) robustness, (4) cryptographic assumptions and models (e.g., only RO vs. AGM). |
| **1.2.** | Identification and prioritization of desirable features | We will research and discuss the priority and importance of specific efficiency and security features for our application (wallets). If necessary, we may involve interviews with external parties such as web3 researchers and/or wallet developers. |
| **1.3.** | TVRFs for threshold Schnorr wallets | We will investigate if existing protocols for TVRFs are compatible with the threshold Schnorr protocols from Task 1.1. We will classify them according to the criteria mentioned for Task 1.1. |


## General Notes
## Summary


0 comments on commit 01140a5

Please sign in to comment.