Breaking and (Partially) Fixing Provably Secure Onion Routing

10/30/2019
by   Christiane Kuhn, et al.
0

After several years of research on onion routing, Camenisch and Lysyanskaya, in an attempt at rigorous analysis, defined an ideal functionality in the universal composability model, together with properties that protocols have to meet to achieve provable security. A whole family of systems based their security proofs on this work. However, analyzing HORNET and Sphinx, two instances from this family, we show that this proof strategy is broken. We discover a previously unknown vulnerability that breaks anonymity completely, and explain a known one. Both should not exist if privacy is proven correctly. In this work, we analyze and fix the proof strategy used for this family of systems. After proving the efficacy of the ideal functionality, we show how the original properties are flawed and suggest improved, effective properties in their place. Finally, we discover another common mistake in the proofs. We demonstrate how to avoid it by showing our improved properties for one protocol, thus partially fixing the family of provably secure onion routing protocols.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/11/2020

Provably insecure group authentication: Not all security proofs are what they claim to be

A paper presented at the ICICS 2019 conference describes what is claimed...
research
09/10/2021

How Does Blockchain Security Dictate Blockchain Implementation?

Blockchain protocols come with a variety of security guarantees. For exa...
research
06/09/2023

McFIL: Model Counting Functionality-Inherent Leakage

Protecting the confidentiality of private data and using it for useful c...
research
03/18/2022

Advanced Models for the OSPF Routing Protocol

We present two formal models for the OSPF routing protocol, designed for...
research
10/09/2017

Ideal Node Enquiry Search Algorithm (INESH) in MANETS

The different routing protocols in Mobile Ad hoc Networks take after var...
research
09/15/2021

Towards a Game-Theoretic Security Analysis of Off-Chain Protocols

Off-chain protocols constitute one of the most promising approaches to s...
research
06/05/2019

Security in Asynchronous Interactive Systems

Secure function computation has been thoroughly studied and optimized in...

Please sign up or login with your details

Forgot password? Click here to reset