[messaging] Panoramix decryption mixnet messaging spec and design documents

dawuud dawuud at riseup.net
Sun Oct 29 11:34:45 PDT 2017

> Yes you are right to point out the vagueness in the PKI spec draft I
> sent you.  Mixnets like Tor require a PKI that clients can query to

Of course I'm not saying that mixnets and Tor are the same... whereas
Tor does no mixing.  Although the similarities are useful when
discussing the PKI because they both have similar needs.

Ania also coauthored another recent paper about mixnets that has some
interesting uses for their PKI to help prevent byzantine or n-1 attacks:

   [MIRANDA] Leibowitz, H., Piotrowska, A., Danezis, G., Herzberg, A., 2017,
             "No right to ramain silent: Isolating Malicious Mixes"

> gain a view of the network so that path selection is possible. Like
> Tor's Directory Authority system we need to store various bits of
> information about each mix in say, a "mix descriptor".
> By "same view" I mean each client (just like in Tor) should receive
> the same network consensus document. The client uses this for path
> selection.
> To be clear, we are totally punting on the load balancing problem because it's hard.
> However, the new Peer Flow paper looks promising:
>    [PEERFLOW] Johnson, A., Jansen, R., Segal, A., Syverson, P.,
>               "PeerFlow: Secure Load Balancing in Tor",
>               Preceedings on Privacy Enhancing Technologies, July 2017,
>               <https://petsymposium.org/2017/papers/issue2/paper12-2017-2-source.pdf>.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://moderncrypto.org/mail-archive/messaging/attachments/20171029/df460b93/attachment.sig>

More information about the Messaging mailing list