Where is the encrypted mask value?How are outPk, mask and amount fields created when spending RignCT coinbase transactions?Error with transaction on the blockchainIs it possible to reset the blockchain with a new genesis block for efficiency?How does having a negative number in a Pedersen commitment, create money out of thin air?How would I exploit the fact that I knew the scalar used for H in the Pedersons Commitment w.r.t G?Why do we use different H values in a vector Pedersen Commitment?How is the used Pedersen commitment kept secret?How does the mixing work?What is the significance of monero switching the G and H points in a Pedersen commitment?Trying to understand how RCTTypeSimple works

As easy as Three, Two, One... How fast can you go from Five to Four?

The significance of kelvin as a unit of absolute temperature

Transfer custom ringtones to iPhone using a computer running Linux

Does a (nice) centerless group always have a centerless profinite completion?

Can there be absolute velocity?

So a part of my house disappeared... But not because of a chunk resetting

Does the new finding on "reversing a quantum jump mid-flight" rule out any interpretations of QM?

How to destroy a galactic level civilization and still leave behind primitive survivors?

Why is long-term living in Almost-Earth causing severe health problems?

Is it safe to remove python 2.7.15rc1 from Ubuntu 18.04?

How can I write the maximally mixed state on m qubits as a linear combination of basis vectors

Make Gimbap cutter

Is Lambda Calculus purely syntactic?

Print "N NE E SE S SW W NW"

What STL algorithm can determine if exactly one item in a container satisfies a predicate?

Why is the length of the Kelvin unit of temperature equal to that of the Celsius unit?

Ability To Change Root User Password (Vulnerability?)

Is it okay to have a sequel start immediately after the end of the first book?

What plausible reason could I give for my FTL drive only working in space

Diatonic chords of a pentatonic vs blues scale?

Who is "He that flies" in Lord of the Rings?

Why do radiation hardened IC packages often have long leads?

empApi with Lightning Web Components?

Should I put programming books I wrote a few years ago on my resume?



Where is the encrypted mask value?


How are outPk, mask and amount fields created when spending RignCT coinbase transactions?Error with transaction on the blockchainIs it possible to reset the blockchain with a new genesis block for efficiency?How does having a negative number in a Pedersen commitment, create money out of thin air?How would I exploit the fact that I knew the scalar used for H in the Pedersons Commitment w.r.t G?Why do we use different H values in a vector Pedersen Commitment?How is the used Pedersen commitment kept secret?How does the mixing work?What is the significance of monero switching the G and H points in a Pedersen commitment?Trying to understand how RCTTypeSimple works













4















Checked this link: https://moneroblocks.info/api/get_transaction_data/4adb55cde1ffcc0ea639b6718355c48c0e574000306d95ef857e55d91ddabcf2



I could not find the encrypted mask value.



I believe the encrypted amount is in the ecdh part:



 "ecdhInfo": [

"amount": "f350bbedb3a4a93b"
,

"amount": "c2005984b560da47"
,

"amount": "6a2a649c8322d6e1"
,

"amount": "0e0c6e72d16779c7"

],









share|improve this question


























    4















    Checked this link: https://moneroblocks.info/api/get_transaction_data/4adb55cde1ffcc0ea639b6718355c48c0e574000306d95ef857e55d91ddabcf2



    I could not find the encrypted mask value.



    I believe the encrypted amount is in the ecdh part:



     "ecdhInfo": [

    "amount": "f350bbedb3a4a93b"
    ,

    "amount": "c2005984b560da47"
    ,

    "amount": "6a2a649c8322d6e1"
    ,

    "amount": "0e0c6e72d16779c7"

    ],









    share|improve this question
























      4












      4








      4








      Checked this link: https://moneroblocks.info/api/get_transaction_data/4adb55cde1ffcc0ea639b6718355c48c0e574000306d95ef857e55d91ddabcf2



      I could not find the encrypted mask value.



      I believe the encrypted amount is in the ecdh part:



       "ecdhInfo": [

      "amount": "f350bbedb3a4a93b"
      ,

      "amount": "c2005984b560da47"
      ,

      "amount": "6a2a649c8322d6e1"
      ,

      "amount": "0e0c6e72d16779c7"

      ],









      share|improve this question














      Checked this link: https://moneroblocks.info/api/get_transaction_data/4adb55cde1ffcc0ea639b6718355c48c0e574000306d95ef857e55d91ddabcf2



      I could not find the encrypted mask value.



      I believe the encrypted amount is in the ecdh part:



       "ecdhInfo": [

      "amount": "f350bbedb3a4a93b"
      ,

      "amount": "c2005984b560da47"
      ,

      "amount": "6a2a649c8322d6e1"
      ,

      "amount": "0e0c6e72d16779c7"

      ],






      ringct






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked May 26 at 18:50









      WeCanBeFriendsWeCanBeFriends

      33617




      33617




















          1 Answer
          1






          active

          oldest

          votes


















          4














          As of the March 2019 hard fork, commitment masks are deterministically derived from the per-output shared secret. This means the ECDHinfo part of the transaction will no longer store the encrypted mask.



          See the commit here: https://github.com/monero-project/monero/commit/7d375981584e5ddac4ea6ad8879e2211d465b79d



          Therefore, to determine the commitment mask, calculate:



          commitment mask = Hs("commitment_mask" || Hs(8aR||i))



          To reduce the storage requirement for the amount from 32 bytes to 8 bytes, the 8 byte amount is now XOR encrypted using an 8 byte key deterministically derived from the shared secret.



          To encrypt the amount, calculate:



          encrypted amount = 8 byte amount XOR first 8 bytes of keccak("amount" || Hs(8rA||i))



          To decrypt the amount, calculate:



          amount = 8 byte encrypted amount XOR first 8 bytes of keccak("amount" || Hs(8aR||i))






          share|improve this answer

























          • TBC: a is the public view key, i is the index of the output in the transaction

            – WeCanBeFriends
            May 26 at 21:11












          • a is the private view key, not public.

            – jtgrassie
            May 26 at 22:10











          • Oh right, 8aR is the public view key

            – WeCanBeFriends
            May 26 at 22:24











          • 8aR is not "the public view key" either. R is the tx public key (the shared part of the shared secret), a is the receivers private view key and i is the output index.

            – jtgrassie
            May 27 at 0:24






          • 1





            @WeCanBeFriends You're right, I've fixed the error in my answer. The shared secret is Hs(8aR||i) and not Hs(8aR||i)G. From a cryptographic point of view, it would also have worked to have chosen to directly use (8aR||i) instead of Hs(8aR||i) (inside these hashed constructions only), but since the code already calculates Hs(8aR||i) for use elsewhere, we just re-use it for simplicity.

            – knaccc
            May 27 at 4:23












          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "656"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          noCode: true, onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fmonero.stackexchange.com%2fquestions%2f11272%2fwhere-is-the-encrypted-mask-value%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          4














          As of the March 2019 hard fork, commitment masks are deterministically derived from the per-output shared secret. This means the ECDHinfo part of the transaction will no longer store the encrypted mask.



          See the commit here: https://github.com/monero-project/monero/commit/7d375981584e5ddac4ea6ad8879e2211d465b79d



          Therefore, to determine the commitment mask, calculate:



          commitment mask = Hs("commitment_mask" || Hs(8aR||i))



          To reduce the storage requirement for the amount from 32 bytes to 8 bytes, the 8 byte amount is now XOR encrypted using an 8 byte key deterministically derived from the shared secret.



          To encrypt the amount, calculate:



          encrypted amount = 8 byte amount XOR first 8 bytes of keccak("amount" || Hs(8rA||i))



          To decrypt the amount, calculate:



          amount = 8 byte encrypted amount XOR first 8 bytes of keccak("amount" || Hs(8aR||i))






          share|improve this answer

























          • TBC: a is the public view key, i is the index of the output in the transaction

            – WeCanBeFriends
            May 26 at 21:11












          • a is the private view key, not public.

            – jtgrassie
            May 26 at 22:10











          • Oh right, 8aR is the public view key

            – WeCanBeFriends
            May 26 at 22:24











          • 8aR is not "the public view key" either. R is the tx public key (the shared part of the shared secret), a is the receivers private view key and i is the output index.

            – jtgrassie
            May 27 at 0:24






          • 1





            @WeCanBeFriends You're right, I've fixed the error in my answer. The shared secret is Hs(8aR||i) and not Hs(8aR||i)G. From a cryptographic point of view, it would also have worked to have chosen to directly use (8aR||i) instead of Hs(8aR||i) (inside these hashed constructions only), but since the code already calculates Hs(8aR||i) for use elsewhere, we just re-use it for simplicity.

            – knaccc
            May 27 at 4:23
















          4














          As of the March 2019 hard fork, commitment masks are deterministically derived from the per-output shared secret. This means the ECDHinfo part of the transaction will no longer store the encrypted mask.



          See the commit here: https://github.com/monero-project/monero/commit/7d375981584e5ddac4ea6ad8879e2211d465b79d



          Therefore, to determine the commitment mask, calculate:



          commitment mask = Hs("commitment_mask" || Hs(8aR||i))



          To reduce the storage requirement for the amount from 32 bytes to 8 bytes, the 8 byte amount is now XOR encrypted using an 8 byte key deterministically derived from the shared secret.



          To encrypt the amount, calculate:



          encrypted amount = 8 byte amount XOR first 8 bytes of keccak("amount" || Hs(8rA||i))



          To decrypt the amount, calculate:



          amount = 8 byte encrypted amount XOR first 8 bytes of keccak("amount" || Hs(8aR||i))






          share|improve this answer

























          • TBC: a is the public view key, i is the index of the output in the transaction

            – WeCanBeFriends
            May 26 at 21:11












          • a is the private view key, not public.

            – jtgrassie
            May 26 at 22:10











          • Oh right, 8aR is the public view key

            – WeCanBeFriends
            May 26 at 22:24











          • 8aR is not "the public view key" either. R is the tx public key (the shared part of the shared secret), a is the receivers private view key and i is the output index.

            – jtgrassie
            May 27 at 0:24






          • 1





            @WeCanBeFriends You're right, I've fixed the error in my answer. The shared secret is Hs(8aR||i) and not Hs(8aR||i)G. From a cryptographic point of view, it would also have worked to have chosen to directly use (8aR||i) instead of Hs(8aR||i) (inside these hashed constructions only), but since the code already calculates Hs(8aR||i) for use elsewhere, we just re-use it for simplicity.

            – knaccc
            May 27 at 4:23














          4












          4








          4







          As of the March 2019 hard fork, commitment masks are deterministically derived from the per-output shared secret. This means the ECDHinfo part of the transaction will no longer store the encrypted mask.



          See the commit here: https://github.com/monero-project/monero/commit/7d375981584e5ddac4ea6ad8879e2211d465b79d



          Therefore, to determine the commitment mask, calculate:



          commitment mask = Hs("commitment_mask" || Hs(8aR||i))



          To reduce the storage requirement for the amount from 32 bytes to 8 bytes, the 8 byte amount is now XOR encrypted using an 8 byte key deterministically derived from the shared secret.



          To encrypt the amount, calculate:



          encrypted amount = 8 byte amount XOR first 8 bytes of keccak("amount" || Hs(8rA||i))



          To decrypt the amount, calculate:



          amount = 8 byte encrypted amount XOR first 8 bytes of keccak("amount" || Hs(8aR||i))






          share|improve this answer















          As of the March 2019 hard fork, commitment masks are deterministically derived from the per-output shared secret. This means the ECDHinfo part of the transaction will no longer store the encrypted mask.



          See the commit here: https://github.com/monero-project/monero/commit/7d375981584e5ddac4ea6ad8879e2211d465b79d



          Therefore, to determine the commitment mask, calculate:



          commitment mask = Hs("commitment_mask" || Hs(8aR||i))



          To reduce the storage requirement for the amount from 32 bytes to 8 bytes, the 8 byte amount is now XOR encrypted using an 8 byte key deterministically derived from the shared secret.



          To encrypt the amount, calculate:



          encrypted amount = 8 byte amount XOR first 8 bytes of keccak("amount" || Hs(8rA||i))



          To decrypt the amount, calculate:



          amount = 8 byte encrypted amount XOR first 8 bytes of keccak("amount" || Hs(8aR||i))







          share|improve this answer














          share|improve this answer



          share|improve this answer








          edited May 30 at 20:29

























          answered May 26 at 19:27









          knacccknaccc

          7,018820




          7,018820












          • TBC: a is the public view key, i is the index of the output in the transaction

            – WeCanBeFriends
            May 26 at 21:11












          • a is the private view key, not public.

            – jtgrassie
            May 26 at 22:10











          • Oh right, 8aR is the public view key

            – WeCanBeFriends
            May 26 at 22:24











          • 8aR is not "the public view key" either. R is the tx public key (the shared part of the shared secret), a is the receivers private view key and i is the output index.

            – jtgrassie
            May 27 at 0:24






          • 1





            @WeCanBeFriends You're right, I've fixed the error in my answer. The shared secret is Hs(8aR||i) and not Hs(8aR||i)G. From a cryptographic point of view, it would also have worked to have chosen to directly use (8aR||i) instead of Hs(8aR||i) (inside these hashed constructions only), but since the code already calculates Hs(8aR||i) for use elsewhere, we just re-use it for simplicity.

            – knaccc
            May 27 at 4:23


















          • TBC: a is the public view key, i is the index of the output in the transaction

            – WeCanBeFriends
            May 26 at 21:11












          • a is the private view key, not public.

            – jtgrassie
            May 26 at 22:10











          • Oh right, 8aR is the public view key

            – WeCanBeFriends
            May 26 at 22:24











          • 8aR is not "the public view key" either. R is the tx public key (the shared part of the shared secret), a is the receivers private view key and i is the output index.

            – jtgrassie
            May 27 at 0:24






          • 1





            @WeCanBeFriends You're right, I've fixed the error in my answer. The shared secret is Hs(8aR||i) and not Hs(8aR||i)G. From a cryptographic point of view, it would also have worked to have chosen to directly use (8aR||i) instead of Hs(8aR||i) (inside these hashed constructions only), but since the code already calculates Hs(8aR||i) for use elsewhere, we just re-use it for simplicity.

            – knaccc
            May 27 at 4:23

















          TBC: a is the public view key, i is the index of the output in the transaction

          – WeCanBeFriends
          May 26 at 21:11






          TBC: a is the public view key, i is the index of the output in the transaction

          – WeCanBeFriends
          May 26 at 21:11














          a is the private view key, not public.

          – jtgrassie
          May 26 at 22:10





          a is the private view key, not public.

          – jtgrassie
          May 26 at 22:10













          Oh right, 8aR is the public view key

          – WeCanBeFriends
          May 26 at 22:24





          Oh right, 8aR is the public view key

          – WeCanBeFriends
          May 26 at 22:24













          8aR is not "the public view key" either. R is the tx public key (the shared part of the shared secret), a is the receivers private view key and i is the output index.

          – jtgrassie
          May 27 at 0:24





          8aR is not "the public view key" either. R is the tx public key (the shared part of the shared secret), a is the receivers private view key and i is the output index.

          – jtgrassie
          May 27 at 0:24




          1




          1





          @WeCanBeFriends You're right, I've fixed the error in my answer. The shared secret is Hs(8aR||i) and not Hs(8aR||i)G. From a cryptographic point of view, it would also have worked to have chosen to directly use (8aR||i) instead of Hs(8aR||i) (inside these hashed constructions only), but since the code already calculates Hs(8aR||i) for use elsewhere, we just re-use it for simplicity.

          – knaccc
          May 27 at 4:23






          @WeCanBeFriends You're right, I've fixed the error in my answer. The shared secret is Hs(8aR||i) and not Hs(8aR||i)G. From a cryptographic point of view, it would also have worked to have chosen to directly use (8aR||i) instead of Hs(8aR||i) (inside these hashed constructions only), but since the code already calculates Hs(8aR||i) for use elsewhere, we just re-use it for simplicity.

          – knaccc
          May 27 at 4:23


















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Monero Stack Exchange!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fmonero.stackexchange.com%2fquestions%2f11272%2fwhere-is-the-encrypted-mask-value%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

          Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

          Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020