Skip to content

Commit

Permalink
Merge pull request #196 from ietf-wg-privacypass/caw/timing-attacks
Browse files Browse the repository at this point in the history
Add section on timing attacks
  • Loading branch information
chris-wood committed Sep 20, 2022
2 parents c8e4703 + 72b0d97 commit 1e3fec4
Showing 1 changed file with 14 additions and 1 deletion.
15 changes: 14 additions & 1 deletion draft-ietf-privacypass-architecture.md
Original file line number Diff line number Diff line change
Expand Up @@ -728,7 +728,20 @@ hit:
Output resp
~~~

## Centralization
## Side-Channel Attacks

Side-channel attacks, such as those based on timing correlation, could be
used to link attestation and redemption contexts together. In particular,
for interactive tokens that are bound to a Client-specific redemption
context, the anonymity set of Clients during the issuance protocol consists
of those Clients that started issuance between the time of the Origin's
challenge and the corresponding token redemption. Depending on the number
of Clients using a particular Issuer during that time window, the set can
be small. Appliations should take such side channels into consideration before
choosing a particular deployment model and type of token challenge and redemption
context.

# Centralization

A consequence of limiting the number of participants (Attesters or Issuers) in
Privacy Pass deployments for meaningful privacy is that it forces concentrated
Expand Down

0 comments on commit 1e3fec4

Please sign in to comment.