[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Proposal 107



Hello:
Attached is a new edited and more clear version of the proposal. Still
details to be worked out, but fewer remain. Please give some feedback.
Unfortunately the formatting is a little too wide.
Thanks,
Watson Ladd
Filename:107-PBC.txt
Title:The pairing-based key negotiation protocol
Version:0.0.1
Last modified:10-March-2007
Author:Watson Ladd
Created:9-March-2007
Status:Open

Overview: This document describes a new version of the tor protocol
	  that uses pairing-based cryptography following [1].

Motivation: The protocol described in [1] is much more efficient in both
	    bandwith and CPU then the current protocol.

Backwards-compatability: Sadly, use of the VERSION cell will negate some of the
			 advantages of the new protocol. This is very much
			 a work in progress. Current solution is a new cell
			 type.

Proposal:
Section 0.0: Magic Numbers
Section 1.0: Precomputation
Section 1.1: Circuit Creation
Section 2.1: The distributed PKG.

Section 0.0: Magic Numbers
	This document tacitly presumes that the Pairing Based Cryptography libray[2] is being used.
	Pairing d225 is used. A new cell type CREATE_WARPSPEED is defined. All cipher modes, key lengths,
	initialization methods, etc. are inherited from the tor specification. All timestamps are big-endian
	representations of the number of seconds since the Unix epoch, 64 bits in length. All hashes are SHA-256.
	The master key validity period(MKVP) is 24 hours in duration. The private key validity period (PKVP)
	is 1 hours. All other magic numbers are inherited from Tor.

Section 1.0: Precomputation.
	As described in Section 2.1 the PKG creates a signed tuple (v, U, sU) where v is a timestamp indicating
	the begining of the current MKVP, U is a random point in G1 of d225, and sU is U added to itself s times.
	The signature is any strong scheme (probably RSA). The OP obtains this tuple from a Directory server, along
	with a list ID[i] of the ID's of the OR's. The OP may precompute the public keys of the OR's by taking
	Q[i]=H(ID[i]||v_m) where v_m is a timestamp indicating the begining of the current private key validity
	period. The ID's are the fingerprints of the RSA public keys of the OR's. The OP may also let r[i] be
	an array of randomly generated integers in Z_r of the pairing (as computed by element_init_Zr). They may then
	take A[i]=r[i]*U. They may then take K[i]=P(sU,Q[i])*r[i].
	Any of these computations may be delayed until use/not performed if not needed.

Section 1.1:Circuit creation
	Let the nodes in the circuit be A, B, and C. Then let us index arrays with A,B,C to take the entry
	corresponding to the node. Then let us abuse notation and write {stuff}_K[i] to denote encrypting stuff
	with the appropriate key derived from the ith entry of K. Then OP will send a CREATE_WARPSPEED cell with
	the following payload to A, and a previously unused CircID:
	A[A],{B,A[B],{C, A[C]{$Padding}_K[C]}_K[B]}_K[A]

	Padding consists of sufficent null bytes to fill out the cell to 512 bytes. A, B, and C are the IP addresses
	of the OR's being used. On recipt of this cell A will compute P(A[A],S[A]) where S[A] is A's secret key.
	A will then decrypt the rest of the payload and find out who B is. A will then send a CREAT_WARPSPEED cell
	using a previously unused CircID to B, whoes contents are the rest of the encrypted section of the payload.

	B behaves similarly. When C sees the padding he realizes that the circuit has been extended to him, and
	sends back a CREATED cell. Traffic is then passed as normal.

Section 2.1: The distributed PKG
	Every PKVP a trusted central server creates the private keys for the OR's. The central server then splits
	them into t shares among m servers, using a polynomial secret sharing scheme. The servers know which OR
	corresponds to which share, and only send a share after encypting it with the RSA key of the OR.

Attachment: signature.asc
Description: OpenPGP digital signature