Delivery-Date: Wed, 07 Jan 2015 05:33:02 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID,
	URIBL_BLOCKED autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 009231E01AD
	for <archiver@seul.org>; Wed,  7 Jan 2015 05:32:59 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 6A96932463;
	Wed,  7 Jan 2015 10:32:55 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 4AEBE30F36
 for <tor-talk@lists.torproject.org>; Wed,  7 Jan 2015 10:32:51 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id IvglmOkW75_J for <tor-talk@lists.torproject.org>;
 Wed,  7 Jan 2015 10:32:51 +0000 (UTC)
Received: from mail-wg0-x229.google.com (mail-wg0-x229.google.com
 [IPv6:2a00:1450:400c:c00::229])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 08EEF291F0
 for <tor-talk@lists.torproject.org>; Wed,  7 Jan 2015 10:32:47 +0000 (UTC)
Received: by mail-wg0-f41.google.com with SMTP id l18so904002wgh.14
 for <tor-talk@lists.torproject.org>; Wed, 07 Jan 2015 02:32:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=from:to:subject:date:message-id:mime-version:content-type
 :content-transfer-encoding:thread-index:content-language;
 bh=IwJeimgh8M+1HY369nGJ4EMefwNXY8vgxaaD8zXEyR0=;
 b=TweqbsUYioo+cvAxX4Xsp2dnFeV2ZXUZGWstqgt56Na7SHkijt8PZ1JIltOw9vQQLB
 iiEETyPk1uN4f9l33b9ahQj0subFpq0AeYVQxTnUmgUZ1BdcDBpFRPVfLsfQeuG5ZcLB
 wsPTV7l8Cl1S39PXgFBmlfK8WbbU2StVono8JSUs8uE05NJ+8IQinHmJOfZmyT/PqzjN
 1plmnc55TItz4AQMtKkAUtPt57WVASpqN9LtSsrrUJr8sXekJuQMCtCrrnYjCRkoCv/e
 CQGqXtkWmCg1JiovhK9sOPm5v8O3TMIoZH8cPl28DOnxOQ7gjtvECxY8KoVhJUBP5z0X
 /0ZQ==
X-Received: by 10.180.24.167 with SMTP id v7mr47535566wif.5.1420626764498;
 Wed, 07 Jan 2015 02:32:44 -0800 (PST)
Received: from COLUMBA (54188AF0.cm-5-1c.dynamic.ziggo.nl. [84.24.138.240])
 by mx.google.com with ESMTPSA id ej10sm19923545wib.1.2015.01.07.02.32.43
 for <tor-talk@lists.torproject.org>
 (version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128);
 Wed, 07 Jan 2015 02:32:43 -0800 (PST)
From: "taxakis" <taxakis@gmail.com>
To: <tor-talk@lists.torproject.org>
Date: Wed, 7 Jan 2015 11:32:32 +0100
Message-ID: <006101d02a65$488c4480$d9a4cd80$@com>
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: AdAqZT6tANLHm41nRd+eoL4VJugo8g==
Content-Language: en-us
X-Antivirus: avast! (VPS 150107-0, 01/07/2015), Outbound message
X-Antivirus-Status: Clean
Subject: [tor-talk] new paper on Tor and cryptography
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


Headline: Post-Quantum Secure Onion Routing (Future Anonymity in Today\'s
Budget), by Satrajit Ghosh and Aniket Kate
http://eprint.iacr.org/2015/008 

The onion routing (OR) network Tor provides anonymity to its users by
routing their encrypted traffic through three proxies (or nodes). The key
cryptographic challenge, here, is to establish symmetric session keys using
a secure key exchange between the anonymous users and the selected nodes.
The Tor network currently employs a one-way authenticated key exchange
(1W-AKE) protocol \'ntor\' for this purpose.   Nevertheless, ntor as well as
other known 1W-AKE protocols rely solely on some classical Diffie-Hellman
(DH) type assumptions for their (forward) security, and thus privacy of
Today\'s anonymous communication could not be ensured once quantum computers
arrive.

In this paper, we demonstrate utility of quantum-secure lattice-based
cryptography towards solving this problem for onion routing. In particular,
we present a novel hybrid 1W-AKE protocol (HybridOR) that is secure under
the lattice-based ring learning with error (ring-LWE) assumption as well as
the gap DH assumption. Due to its hybrid design, HybridOR is not only
resilient against quantum attacks but also at the same time allows the OR
nodes to use the current DH public keys and subsequently requires no
modification to the current Tor public key infrastructure. Moreover, thanks
to the recent progress in lattice-based cryptography in the form of
efficient ring-based constructions, our protocol is also computationally
more efficient than the currently employed 1W-AKE protocol ntor, and it only
introduces small and manageable communication overhead to the Tor protocol.


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

