We need to have a formalized version of the privacy matrix (pp. 3-4) for security analysis. So far, it is informal. For now, I don't know how to do this yet, but I already envision a master theorem like as follows:
If (<proof type 1> satisfies <insert security models properties here> and <Seraphis conditions for it>) and (<proof type 2> satisfies <insert security models properties here> and <Seraphis conditions for it>) and ..., then the resulting Seraphis instance satisfies the privacy matrix.
Being an abstraction, we do not need to focus on specific proof systems: we just assume satisfaction of security models properties.
Expected to not be part of security analysis: features akin to multisig-friendliness, etc.
We need to have a formalized version of the privacy matrix (pp. 3-4) for security analysis. So far, it is informal. For now, I don't know how to do this yet, but I already envision a master theorem like as follows:
If (<proof type 1> satisfies <insert security
modelsproperties here> and <Seraphis conditions for it>) and (<proof type 2> satisfies <insert securitymodelsproperties here> and <Seraphis conditions for it>) and ..., then the resulting Seraphis instance satisfies the privacy matrix.Being an abstraction, we do not need to focus on specific proof systems: we just assume satisfaction of security
modelsproperties.Expected to not be part of security analysis: features akin to multisig-friendliness, etc.