> Yes you are right to point out the vagueness in the PKI spec draft I
> sent you.  Mixnets like Tor require a PKI that clients can query to

Of course I'm not saying that mixnets and Tor are the same... whereas
Tor does no mixing.  Although the similarities are useful when
discussing the PKI because they both have similar needs.

Ania also coauthored another recent paper about mixnets that has some
interesting uses for their PKI to help prevent byzantine or n-1 attacks:

   [MIRANDA] Leibowitz, H., Piotrowska, A., Danezis, G., Herzberg, A., 2017,
             "No right to ramain silent: Isolating Malicious Mixes"
             <https://eprint.iacr.org/2017/1000.pdf>.

> gain a view of the network so that path selection is possible. Like
> Tor's Directory Authority system we need to store various bits of
> information about each mix in say, a "mix descriptor".
> 
> By "same view" I mean each client (just like in Tor) should receive
> the same network consensus document. The client uses this for path
> selection.
> 
> To be clear, we are totally punting on the load balancing problem because 
> it's hard.
> However, the new Peer Flow paper looks promising:
> 
>    [PEERFLOW] Johnson, A., Jansen, R., Segal, A., Syverson, P.,
>               "PeerFlow: Secure Load Balancing in Tor",
>               Preceedings on Privacy Enhancing Technologies, July 2017,
>               
> <https://petsymposium.org/2017/papers/issue2/paper12-2017-2-source.pdf>.

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Messaging mailing list
Messaging@moderncrypto.org
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to