Skip to content

Pfitzmann attack on pseudonyms with continious registration #24

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
JanisErdmanis opened this issue Aug 18, 2024 · 0 comments
Open

Pfitzmann attack on pseudonyms with continious registration #24

JanisErdmanis opened this issue Aug 18, 2024 · 0 comments

Comments

@JanisErdmanis
Copy link
Member

JanisErdmanis commented Aug 18, 2024

A recent paper brought to my attention that exponentiation mix-based voting systems can be susceptible to Pfitzmann-like attacks. This vulnerability allows an attacker to track a specific pseudonym by exponentiating it with a random factor during registration. After each braiding, the attacker can exponentiate all pseudonyms with the same random factor, identifying a match. This method enables the attacker to consistently track how a particular person votes.

Initially, it may seem that this attack vector is mitigated by requiring a signed membership certificate before inclusion in the braidchain ledger. However, an adversary can insert an arbitrary pseudonym into the membership certificate during registration when the base generator is already braided. Consequently, a corrupt registration process could still enable vote tracking.

To address this issue, we can add a proof of knowledge for the pseudonym exponent in the membership certificate. This would prevent an adversary from using another person's pseudonym obtained from a public bulletin board.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant