[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #8244 [Tor]: The HSDirs for a hidden service should not be predictable indefinitely into the future



#8244: The HSDirs for a hidden service should not be predictable indefinitely into
the future
-----------------------------+-----------------------------------
     Reporter:  arma         |      Owner:
         Type:  enhancement  |     Status:  new
     Priority:  normal       |  Milestone:  Tor: 0.2.5.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  tor-hs needs-proposal
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+-----------------------------------

Comment (by asn):

 Apparently the GNUNet people are also in need of a similar mechanism.
 Specifically, they need a way to generate public keys in a collaborative
 byzantine setup; this is harder than our use case, since we only need to
 generate a nonce. Particularly they are planning on implementing a paper
 called "One Round Threshold Discrete-Log Key Generation without Private
 Channels".

 Apparently, the complex is not easy to implement and contains peculiar
 crypto schemes. Part of the complexity is caused by the fact that the
 resulting value must be a public key, so all the nodes have to do multiple
 checks to ensure that the resulting value is a public key.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8244#comment:17>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs