1. Is this a for-profit company? It takes some balls to go online and ask people to donate their time to your company for free, I'll give you that.
2. My day job is this industry and I understand maybe 40-50% of what you're talking about. An average programmer would be even more lost than me. A few definitions would go a long way.
3. I tried reading your, ahem, "whitepaper", but there's non-technical details mixed in with technical details. I'm not going to expend the effort separating the chaff. Please first decide the target audience for the document and whether you're going to write a commercial brochure or a technical paper,
then write either one or the other. Don't amalgamate both into the same document. You're going to confuse non-technical people and frustrate technical people.
As a software developer, here's what I expect from a whitepaper:
a. Get rid of superfluous images and bitmap backgrounds; it's just BS that I have to scroll through. If it doesn't convey any information it doesn't belong, but diagrams to help explain concepts are acceptable.
b. Get rid of anything non-software and non-cryptography related. I don't care about "governance" or your custom EEG hardware. If you want to mention the hardware you can say something like "private keys can be securely derived using biometrics hardware". For a specification of the software implementation that's enough.
c. The references are broken. To check a reference (e.g. [14]) I have to end of the document, manually search the reference, and hope I can find my way back to where I was reading. Software such as LaTeX or wikis can generate references that are direct links to the sources. If your going to use such software to generate the document, just link to the source inline. For example,
Predicted in 1916 (Einstein, A. (1918) "Über Gravitationswellen". part 1: 154–167) by Albert Einstein, there are gravitational waves |
Also, please get someone to proofread the document. It looks unprofessional when I can count ten errors in a single page; some are typos and some happened because the writer is not a native English speaker.
4.
zero-confirmation transactions |
What does that mean? I looked in the paper and the phrase doesn't appear once.
Intuitively, to me it means that a transaction is valid the moment the spender signs it, even before it's been included in a blockchain (since a single-confirmation transaction would be valid as soon as a block has included it, which is seen in PoS networks such as Algorand).
However, if that's what it means, I have no idea how something like that could be implemented, even at a theoretical level.
5.
creating a new quantum resistant signature based algorithm |
Two-Factor Proof Of Knowledge which is a new quantum resistant signature based algorithm |
Reading the paper, section 6.1, it seems that "two-factor PoK" means
signature = hash(message + private_key)
However, the text doesn't make it clear what the roles of H1, H2, H3, and H4 are in the scheme. That aside, a hash function is
technically quantum-resistant, but it's not
more secure than elliptic-curve cryptography. ECC and RSA are secure because it's know that the discrete logarithm problem and the prime factorization problem are difficult problems with no (publicly) known fast solutions. On the other hand, there's no theoretical basis that makes any hash function secure (in particular, for the purposes of this discussion, collision-resistant). Hash algorithms are designed such that they're difficult to reverse, but eventually they're weakened and broken. See for example MD5 and SHA-1.
Feel free to correct me if I'm wrong or if I misunderstood the text.