Paper 2024/020
EROR: Efficient Repliable Onion Routing with Strong Provable Privacy
Abstract
To provide users with anonymous access to the Internet, onion routing and mix networks were developed. Assuming a stronger adversary than Tor, Sphinx is a popular packet format choice for such networks due to its efficiency and strong protection. However, it was recently shown that Sphinx is susceptible to a tagging attack on the payload in some settings. The only known packet formats which prevent this attack rely on advanced cryptographic primitives and are highly inefficient, both in terms of packet sizes and computation overhead. In this paper, we provide the first packet format that protects against the tagging attack with an acceptable overhead. At the cost of doubling the payload size, we are able to build a provably private solution from basic cryptographic primitives. Our implementation demonstrates that our solution is as computationally efficient as Sphinx, beating previous schemes by a large margin. For our security proof, we first strengthen the state-of-the-art proof strategy, before applying it to our solution to demonstrate that not only the tagging attack is prevented, but our scheme is provably private.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- Anonymous CommunicationOnion RoutingMix NetsTagging AttackPacket Format
- Contact author(s)
-
michael klooss @ aalto fi
andy rupp @ rub de
daniel schadt @ kit edu
thorsten strufe @ kit edu
christiane weis @ neclab eu - History
- 2024-01-08: approved
- 2024-01-05: received
- See all versions
- Short URL
- https://ia.cr/2024/020
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/020, author = {Michael Klooß and Andy Rupp and Daniel Schadt and Thorsten Strufe and Christiane Weis}, title = {{EROR}: Efficient Repliable Onion Routing with Strong Provable Privacy}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/020}, year = {2024}, url = {https://eprint.iacr.org/2024/020} }