On Tue, Oct 22, 2024 at 3:47 AM stifle_savage042--- via tor-dev
<tor-dev@lists.torproject.org> wrote:
>
> Hi all,
>
> I want to promote some recent work of mine in the hope that someone here will 
> find it interesting or useful. In my most concise language, it is a 
> "decentralized, asynchronous entropy generator protocol." I've made a 
> somewhat complete demo implementation so far. Here's the repository: 
> https://github.com/devnetsec/rand-num-consensus. The integrity of the entropy 
> can only be compromised if all nodes in the ring are malicious and 
> coinciding. Currently, a Tor client cannot anonymously connect to an onion 
> service by directly contacting the rendezvous point, because that relay could 
> have been chosen maliciously by the onion server. I wager that a scheme like 
> this could enable onion servers and clients to share the same circuit. Both 
> parties would have a guarantee that their relays were chosen randomly.
>
> The most similar solution I could find to this was in the TorCoin paper, but 
> it appears to require a more complicated zero-knowledge proof. If there is 
> serious interest in this, I'd be willing to write a proposal draft. Besides 
> implementation difficulty, is there any outstanding flaw in this idea?

Uh, yes. Depending on how we class implementation difficulty.
- A node can go offline before revealing to influence the random
choice. This is very hard to deal with in general.
- Encryption isn't a commitment, particularly not with AES-GCM

Sincerely,
Watson Ladd
>
>
> Best Regards,
>
> Dylan Downey [devnetsec]
> _______________________________________________
> tor-dev mailing list
> tor-dev@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev



-- 
Astra mortemque praestare gradatim
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to