Treat Randomness With Care: Breaking and Provably Fixing Anonymity of Tor Proposal 295

  • Daichong Chao
  • , Liehuang Zhu
  • , Dawei Xu*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Tor proposal 295, currently the only open proposal for onion encryption (OE), emerged from a work presented at CRYPTO 2017 and has garnered significant attention from the Tor team for its strong security and efficiency base. However, upon closer examination, it is evident that the design of proposal 295 exhibits a critical flaw—namely, the randomness within the intermediate onion layers is incomplete. This incompleteness renders proposal 295 noncompliant with the Tor-specific anonymity notion known as CircuitHiding, introduced at EUROCRYPT 2018. In this article, we highlight this anonymity flaw that trivially breaks the CircuitHiding notion. We propose a lightweight fix and rigorously prove the security of the corrected design. To our knowledge, this article provides the first formal treatment of proposal 295, contributing to Tor’s cryptographic infrastructure. Given that OE has gained prominence as a critical tool for privacy-preserving Internet of Things (IoT) applications, a thorough analysis of its anonymity property is crucial for securing these applications.

Original languageEnglish
Pages (from-to)32965-32979
Number of pages15
JournalIEEE Internet of Things Journal
Volume12
Issue number16
DOIs
Publication statusPublished - 2025
Externally publishedYes

Keywords

  • Anonymity
  • Tor
  • anonymous communication
  • provable security

Fingerprint

Dive into the research topics of 'Treat Randomness With Care: Breaking and Provably Fixing Anonymity of Tor Proposal 295'. Together they form a unique fingerprint.

Cite this