On 25 October 2013 08:24, Geoffrey Irving <[email protected]> wrote:
> On Fri, Oct 25, 2013 at 5:19 AM, Tom Ritter <[email protected]> wrote:
>> Couldn't you just throw the KeyID?  That is, specify it as all 0's
>> (like gpg's --throw-keyid option).  this won't kind the fact that it's
>> encrypted to 6 keys, but it will hide what those Key IDs are.
>
> This isn't very secure: the message still amounts to a proof that it
> was encrypted for the given recipients.  If you suspect who they are,
> now you know for sure.

I don't think so.  If I have a message encrypted to 6 thrown Key IDs,
AND I have the 6 public keys AND I have 1 private key - I still don't
know that the message was encrypted to _those_ six keys, I only know
that it was encrypted _to_ six keys, one of which I know because I
have the private key for it.

The only way to determine a message was encrypted to a public key, if
the KeyID is thrown, is if you possess the private key.  And if the
threat model includes protecting against an adversary who has the
message, and a recipient's private key, and you want to make the
recipient be able to deny it was encrypted to them.... you're going to
have a hard time of it.

And if the threat model also includes obscuring how _many_ recipients
got the message, then throwing Key IDs is problematic.

-tom
_______________________________________________

http://openpgpjs.org
Subscribe/unsubscribe: http://list.openpgpjs.org

Reply via email to