[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #8244 [Tor]: The HSDirs for a hidden service should not be predictable indefinitely into the future
#8244: The HSDirs for a hidden service should not be predictable indefinitely into
the future
-----------------------------+-----------------------------------
Reporter: arma | Owner:
Type: enhancement | Status: new
Priority: normal | Milestone: Tor: 0.2.5.x-final
Component: Tor | Version:
Resolution: | Keywords: tor-hs needs-proposal
Actual Points: | Parent ID:
Points: |
-----------------------------+-----------------------------------
Comment (by asn):
Apparently the GNUNet people are also in need of a similar mechanism.
Specifically, they need a way to generate public keys in a collaborative
byzantine setup; this is harder than our use case, since we only need to
generate a nonce. Particularly they are planning on implementing a paper
called "One Round Threshold Discrete-Log Key Generation without Private
Channels".
Apparently, the complex is not easy to implement and contains peculiar
crypto schemes. Part of the complexity is caused by the fact that the
resulting value must be a public key, so all the nodes have to do multiple
checks to ensure that the resulting value is a public key.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8244#comment:17>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs