On Tuesday, October 22nd, 2024 at 11:24 PM UTC, Watson Ladd wrote:
>
>
> On Tue, Oct 22, 2024, 4:15 PM <stifle_savage...@silomails.com> wrote:
>
> On Tuesday, October 22nd, 2024 at 9:04 PM UTC, Watson Ladd wrote:
>
> > On Tue, Oct 22, 2024 at 3:47 AM stifle_savage042--- via tor-dev
> > tor-dev@lists.torproject.org wrote:
> >
> > > Hi all,
> > >
> > > I want to promote some recent work of mine in the hope that someone here 
> > > will find it interesting or useful. In my most concise language, it is a 
> > > "decentralized, asynchronous entropy generator protocol." I've made a 
> > > somewhat complete demo implementation so far. Here's the repository: 
> > > https://github.com/devnetsec/rand-num-consensus. The integrity of the 
> > > entropy can only be compromised if all nodes in the ring are malicious 
> > > and coinciding. Currently, a Tor client cannot anonymously connect to an 
> > > onion service by directly contacting the rendezvous point, because that 
> > > relay could have been chosen maliciously by the onion server. I wager 
> > > that a scheme like this could enable onion servers and clients to share 
> > > the same circuit. Both parties would have a guarantee that their relays 
> > > were chosen randomly.
> > >
> > > The most similar solution I could find to this was in the TorCoin paper, 
> > > but it appears to require a more complicated zero-knowledge proof. If 
> > > there is serious interest in this, I'd be willing to write a proposal 
> > > draft. Besides implementation difficulty, is there any outstanding flaw 
> > > in this idea?
> >
> >
> > Uh, yes. Depending on how we class implementation difficulty.
> > - A node can go offline before revealing to influence the random
> > choice. This is very hard to deal with in general.
> > - Encryption isn't a commitment, particularly not with AES-GCM
> >
>
> I don't think my README explanation is quite clear enough. The purpose of 
> encrypting "blocks" is to allow each node to be confident that its peers 
> cannot manipulate the consensus in a way that jeopardizes its randomness (I 
> suppose the consensus can be manipulated, but the result would still be 
> random). It's as if a group of people each secretly write down a number 0 
> through n on a slip of paper, put those slips in a hat, then publicly sum 
> these numbers once enough people have added their slips, and consider the 
> remainder of that sum, when divided by n, the consensus. Then they can each 
> truthfully testify that the consensus is random, so long as they are 
> confident in the randomness of their own random number. A participant would 
> have to know all the numbers their peers chose to successfully make the 
> consensus equal the malicious target value. If a node is offline during the 
> routine, the client will simply see one less signature on the consensus. I 
> partially agree with your first point though. Currently, a node can stall the 
> consensus by refusing to publish its reveal key.
>
>
> AES-GCM is not committing. There are messages that can be decrypted two 
> different ways with different keys.
>
>

The commitment isn't the encryption of the random number, it's the signature on 
that ciphertext.
See message::Block. The AES-GCM nonce makes sure that decryption fails if the 
incorrect reveal key is used.
That's what I'm guessing you mean by "commitment," can you explain a bit more?

Dylan Downey [devnetsec]

> I apologize for that broken link.
>
> Dylan Downey [devnetsec]
>
> > Sincerely,
> > Watson Ladd
> >
> > > Best Regards,
> > >
> > > Dylan Downey [devnetsec]
> > > _______________________________________________
> > > tor-dev mailing list
> > > tor-dev@lists.torproject.org
> > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
> >
> >
> >
> >
> > --
> > Astra mortemque praestare gradatim
>
-----BEGIN PGP MESSAGE-----

owGNV8+LJEkV7nHXwxSIi4c5CAvPZmEUqqp72hGx1J7t6Wl3CnZY2elFUWSJynyZ
GVuZETkRkV1T4x4ERXRB8A8QlMWreBEvelDYZQ7iXeameFEPzsWbsH4vIutHt72O
1Yeuyox4P773ve9F/Phjz+0Mrt19MH3vpy8c7175w99nO+WLt/76mqHTjn2ulkN6
LQt2xo4ODkw+pIP9g5ukAt24McGXr96jN06Ph/Q1Fbw19KrKc1o4G3gyOJQ/Soai
ERhI24d0c3Ljc3/5zi+x+0s+6KLmN706UyXv3zx42evaNkrXfpzZ5nDLGsnn2YF9
YbL/rLiipctjEwufndz8PKI7ukcXgxuNRnSmFQXrRjmfrS31v1+utQ9+jF+ts29x
FsbWlWu/ae16zyHd1aTqerh5svVuSgtlAgwTTDUwQN42TI4zxuOFdXOyBTXaMGlD
oWKqbMv4gvhlpcWLih3TQtc1FdrkpAOWBjxDVqYk66jzXHT1mKaGmiU11gfKrMm0
Z6qVKTskPYzbPCnazaNvp2r9iIG38kuTVc4a23mSF7ZdUsmGnQIAEnawma3HuzS9
fsbUqJxhRWJbSJAoblsz8sq5saTlRwMrKmjUy1sqlBvTXUR73cf0HLfWa1heTqgK
ofWTvb1Sh6qbCU/2gL7h4Dnbc8rkI9M1I6Ti2fjOj+m04ph76XRYCnBicRVzpgxZ
Uy9pxjEq4A0EgFch5SFjc/YrkJ0gp5ykU+tMS+pwh20asOV4OabjzjmYrkFQRadA
Iqu11AxujA1Ybs2ywUY4RIQGLJEqxxhi6uzOdMY0W1KuUe6Q1gWVxaolKEzOj87E
eQvHYYjIM4VipvI7rpXs6eqcKgXoZ8yGssoCjU3cku8ymtv4ZUD+D2Feia6KtlCw
rEJhqNZzMQ8mJMNs1Kw+v7eHImbrJSdfCVLiwiuYyLTLOh3GdNuGilrlggawi02c
ikA5lC9wnwm2apfywUJhc5+F1Ng29XJ8ae9ItSOZvW50rRzoVHeRV9M++tgPiDAm
tFDr8qJcx0AUwbXsAGsXhP6qbVm5mJLjBx2qglAb6xJdgKcKoMsjdnY0N3ZRc16y
8N8WaK3INSyFI8AUGbPqwuRV+yE6JBf2Sa/GIluIhg7iBmbAe1VT7lQh2LHXkY/n
GybXRaGzrg5gnfa9S2XA9S74ALTEbFGrxconwYq6dVGU1iC+UQ1pyeicO9xy2g0v
lV2gDCix8v8jgk1RRnQU2ye2WGnReEUtijXjQtBzfMZqlbA2Rd2xyRJhUoHXhlB2
9IT0sUTuCWxbgjMuFhGJ1IAOnEJuSYDq7RhOTOaWbQxSe3NdSI26NTpI8MNERASu
HFpCOjSaOjq5P3rl+N4GmP7blHIrNoChmYtqvn5ydOfeCfHDFpKpei8ElgQBCrxB
q9iurJIItZ1DOVkkiPuwkP7urLbZ3O/G0llRHQDNKqsSengUpckUKJoMBekNjR5r
WbquF5ZGGd0ijZAQXKufoKJA8mXa9xZbZJxDw320kZA2jIp+ekq+a2N85y1I+Wa8
5SFPvZHEyKPofRtjskAxZ6v6fQb8D9BvabBC2tvZrpXcWwQB9YgpQrMdi8olyud2
IfFCwGW078OHE/hI9FHkqNbJQurQNkYhEcuLPlekOZTY0MfdDO0J275r5AnWJcMe
1jLuS7MKJ4lQnqOZk/JEm8Ne4Y00nutzxgHFyK84SmTkds2QFuIy12daLEBczfA8
jpECUWjS0InpB9eFClMYQQaZzMVyrX3bNVwVaiizsbYyhXyypNw2N1ZzalPVNO2Q
jQCbnvcgjNGeif26VSZsSzEoJ1IWB6DYW6GWLPW8i7iLzndZBk8piUbNL9IHmqmS
mc3UDMqVHOhMoemjSqrEde3XKpF3bj3xIGN41OOZ5mk82HhRIZSXZRRhSknCXpdo
xM7Jo4sFmKaElUSqSsecun1pO4eh4KDJcaIKp2LPnhvmaymDova4bJJEvR1OU76X
s8g8X6UWizpHcxZpjErSq4tkK62b5CjE48Npkm45YiAZTGKf+ND3IA5hohpC0YWN
ossuohFHpOSyeQaHPnkcDE5jsCvV64UwnYLW6piY8rfzJJEDYH8EuwCsBKVbhBv4
YRgP7vM65MnktghakrxVriZ2nNADJepcP+L7fMR9IYd+EYoQT2uZdXL82UJP4MIp
Jx8jGyVBxYPk9HqDcwMcC/IoJIIQqJa0u6XyuxE/eRuFOsrEDKNdpvitweDOEuJN
d9Ah8PLN9VnyWwBuJfuqtbUtIZuE2ZVinzk7Rz+DrPPxekB8qKnNcL2P5FAhkGr9
aOuecslF4bYcFl7nErrtL78ufLjX9ZI3/9/P70bp/9be/n5Dci8TmOWe89+vL73+
bC1bHdsvW7aXlXo002ZPXGDQxEU4E9i9C3etZ/2n0Wj99cjjuiI1Dtw86ORMpoCk
9FbpVI5hjRPG4Afd8zvXBjsvXvvU8w9fetD98NUvX336+N+/Xl2JP/oRuQ/vDK6+
sHryjcMrO9+/+87vv3dCH9/5c/He7DePv/3uk39+5e3pj/70i5f+9e4Xf3X16zsf
vP3z7z5559DvX3n/J+9/UP32Z59UT58+md96/PjRH/Ur2See+w8=
=d5Nx
-----END PGP MESSAGE-----

Attachment: gpg.key
Description: Binary data

_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to