[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #8106 [Tor]: Make .onion addresses harder to harvest by directory servers
#8106: Make .onion addresses harder to harvest by directory servers
------------------------+--------------------------------
     Reporter:  asn     |      Owner:
         Type:  defect  |     Status:  new
     Priority:  major   |  Milestone:  Tor: 0.2.5.x-final
    Component:  Tor     |    Version:
   Resolution:          |   Keywords:  SponsorZ tor-hs
Actual Points:          |  Parent ID:
       Points:          |
------------------------+--------------------------------
Comment (by hyperelliptic):
 Hi everybody.
 Replying to [comment:29 asn]:
 > There might be a smart multiplication somewhere there that would make
 the unblinded public key disappear from the equation, but I don't see it
 currently.
 >
 Yes, the equation changes. The initial version had some divisions, which
 will not be so good performance wise. So, here is how it works without
 blinding the base point:
 General system set up: base point B on elliptic curve, B has prime order
 l.
 Signer knows: a (secret key), h=blinding factor of the day
 =hash(date,A,B), where date is given in some agreed upon precision.
 Long-term public key (known to the user): A=aB
 Public key of the day: A'=hA=(ha)B
 This means, that the secret key of the day is (ha).
 Signature which is valid under A':
 Pick random r (or better, compute it in some deterministic manner, see
 EdDSA paper),
 compute R=rB, compute S=r+hash(R,A',M)ah mod l, send signature (R,S) and
 public key A'
 Verify at DS: check whether SB=R+hash(R,A',M)A'.
 This works for a valid signature since
 SB=(r+hash(R,A',M)ah)B=rB+(hash(R,A',M)ah)B=R+hash(R,A',M)A'
 Verify by user: User knows A and date, so can compute A' to query DS. Can
 verify signature
 the same way as DS does.
 All the best
   Tanja
-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8106#comment:30>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs