[liberationtech] Breaking and (Partially) Fixing Provably Secure Onion Routing
Yosem Companys
ycompanys at gmail.com
Fri Nov 22 01:34:50 CET 2019
From: grarpamp <grarpamp at gmail.com>
(Posted on cypherpunks at cpunks.org)
https://arxiv.org/abs/1910.13772
After several years of research on onion routing, Camenisch and
Lysyanskaya, in an attempt at rigorous analysis, defined an ideal
functionality in the universal composability model, together with
properties that protocols have to meet to achieve provable security. A
whole family of systems based their security proofs on this work.
However, analyzing HORNET and Sphinx, two instances from this family,
we show that this proof strategy is broken. We discover a previously
unknown vulnerability that breaks anonymity completely, and explain a
known one. Both should not exist if privacy is proven correctly. In
this work, we analyze and fix the proof strategy used for this family
of systems. After proving the efficacy of the ideal functionality, we
show how the original properties are flawed and suggest improved,
effective properties in their place. Finally, we discover another
common mistake in the proofs. We demonstrate how to avoid it by
showing our improved properties for one protocol, thus partially
fixing the family of provably secure onion routing protocols.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ghserv.net/pipermail/lt/attachments/20191121/a0316299/attachment.html>
More information about the LT
mailing list