[Privacy-pass] Re: Call for adoption: draft-yun-cfrg-arc-01 (Ends 2025-09-30)

Cathie Yun <cathieyun@gmail.com> Sun, 28 September 2025 22:25 UTC

Return-Path: <cathieyun@gmail.com>
X-Original-To: privacy-pass@mail2.ietf.org
Delivered-To: privacy-pass@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 826996A41C8F for <privacy-pass@mail2.ietf.org>; Sun, 28 Sep 2025 15:25:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zk3YiYuvj3GE for <privacy-pass@mail2.ietf.org>; Sun, 28 Sep 2025 15:25:17 -0700 (PDT)
Received: from mail-lf1-x12d.google.com (mail-lf1-x12d.google.com [IPv6:2a00:1450:4864:20::12d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 0A67B6A41C60 for <privacy-pass@ietf.org>; Sun, 28 Sep 2025 15:25:17 -0700 (PDT)
Received: by mail-lf1-x12d.google.com with SMTP id 2adb3069b0e04-57b35e176dbso4961732e87.1 for <privacy-pass@ietf.org>; Sun, 28 Sep 2025 15:25:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1759098316; x=1759703116; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=Yolr0vz3AhhNKtXce7kS8/HTqAqO32QpvzzKcZnQMuU=; b=bBPTFj5S3XtzwIFbEz/pIAFz9C2x7CovUzQ/bhdK0fF7ZeaklpgKOj10n/CBnWkTnz qEq05nG+etk/BPkrmsPWNq2+vYyKqa7VbxMnvsntJM3hdr0rXIUn662ySi1QvcLHbcG/ VnnLkIdfo03uJquBo3ULYA1UdnlvOTxSvr2VIgG6LrB3HPI9ZiYQEK+g2Pg4+K/LReLW N7q4vtNjryxND0BFV9gjhOx37IQVLH8jFX+EbCAN+i/9oibsjHoTtGD3fLHTTcuwrG1L /sUfkK4Lnlk6MB1p6cUZVRlGXpGNDmNURYMfnc0BY7uw2Hw4s2shRrMAtR2U4VRLU5j/ EP8A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1759098316; x=1759703116; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Yolr0vz3AhhNKtXce7kS8/HTqAqO32QpvzzKcZnQMuU=; b=JbK8PeZArY4I4JrmLWG2FiIS7zzouIrFM/yoF9YtJoWgjpeY/5MYvOM6ztb2GD64l4 Y1wgndyiJYky3+wCDhQMHeNEeaIQ6kssW6ei0df6CYL8zTnQ600mzU5y9tDlSBt7n5Ph 5vrkVQxFQwZB0WxlsDjlmwK+OZP4tTkWWy14bubzDqVU1IAY1suhc32EcwQfxDlqoXw7 MHYNd0rah934H4xWbHVYx/NmiJz43JZO7r/Bw3urHRidnsSegBShjQiRbwJYWp/7h2Wg 25BLHEl2pAgkM1aiPTUfluJmuU+PsTAX2ZEic6TbUC7LRNOK0i334Bvz8tHDfXYky0dD /ZDw==
X-Forwarded-Encrypted: i=1; AJvYcCWCWvKvvo3mBY2qVHADt3w7gKI1njrEsdEFPKt7R3cVbx4hunje7xtwDx/H/bx8UTvVNeXkiobTqvotUgQ=@ietf.org
X-Gm-Message-State: AOJu0YypgEMHM4sb7jAlThsaT/CYg+JpBfCaI3yTG7CsjAh68544LMC0 tWuiCon1lIRzdfMSs9PlkP+cqJXIEsp29DTGlZd7ZsvJLbjcmYOIhMZKNgyZjgCfF+41IJkSbG6 IQ31geOG45DwSHTkUGlSOXx6NNxLFzAI=
X-Gm-Gg: ASbGncsfrckpTuevB5X3Hy2hRbRQ4mMbrhSQ1YWbVP2rUbhBDnZNudC7a05OgBt8Jyx A02euVY0VnUUH3C6D+9QPprb/2wPiQ9Bfp7XV8AJIi7S+FiDOv/5ZrUe8dwst6v5/vAhoBbiz8r 06U3gxn1dvowPdEQKrNTplJ/778Mg0koz/DG55rVnpKyotDZsrb8Ob1GJM4xPPRrQenChtmZZwr yuoPqixfQET5dWJluZjxGiqKnWotHGY3HEIn2XPsdizPJ3i
X-Google-Smtp-Source: AGHT+IGaU1Hazn/j2I8QROEWzePapHv9FFBH0cWRmwB6QQBc9BWfw2eiXija4WGjt8/oL/CmjrRo2NRcmimQe6iLV+o=
X-Received: by 2002:ac2:4bd2:0:b0:579:b74e:eed4 with SMTP id 2adb3069b0e04-582d39b5033mr4932444e87.37.1759098315218; Sun, 28 Sep 2025 15:25:15 -0700 (PDT)
MIME-Version: 1.0
References: <175743223656.3028082.18038260620878661871@dt-datatracker-f7c8fdcb7-pjx77> <CAG2Zi22hj8x+VDfL4_D=d+E-pwJyzY7FK1Ys+VgAccPuUFZqxA@mail.gmail.com> <8q8-bBXqD0lulL8AmrhFIhWg3PEtAw7CpLyJ3rXawk8zyxcZIhcjVhaMpqhPhFbafaY5jmiZA0WshZ_ACCh43_8uFvAqSbIpbRKey8H0DPU=@thibault.uk>
In-Reply-To: <8q8-bBXqD0lulL8AmrhFIhWg3PEtAw7CpLyJ3rXawk8zyxcZIhcjVhaMpqhPhFbafaY5jmiZA0WshZ_ACCh43_8uFvAqSbIpbRKey8H0DPU=@thibault.uk>
From: Cathie Yun <cathieyun@gmail.com>
Date: Sun, 28 Sep 2025 15:25:03 -0700
X-Gm-Features: AS18NWDcRsLA7A0F6Z5xT5WGFT4nzUHYfbcmnfR5W1CUOvBMZjYpLh4tdRqRfcg
Message-ID: <CAExNBoC=OKRYgGrFis6ZA-pWUXeE-dMmvQfQoVKaqJG_VydSLw@mail.gmail.com>
To: Thibault Meunier <ot-ietf=40thibault.uk@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="0000000000003422b4063fe3febe"
Message-ID-Hash: QF6VXNDTIHHBWJ5YSOSMDPKIHYLZ5VMH
X-Message-ID-Hash: QF6VXNDTIHHBWJ5YSOSMDPKIHYLZ5VMH
X-MailFrom: cathieyun@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Christopher Patton <cpatton=40cloudflare.com@dmarc.ietf.org>, Benjamin Schwartz <ietf@bemasc.net>, draft-yun-cfrg-arc@ietf.org, privacy-pass@ietf.org, privacypass-chairs@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Privacy-pass] Re: Call for adoption: draft-yun-cfrg-arc-01 (Ends 2025-09-30)
List-Id: Privacy Pass Protocol <privacy-pass.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/privacy-pass/A3VHUdHqhslwBzYEQjcaXzYQAxQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/privacy-pass>
List-Help: <mailto:privacy-pass-request@ietf.org?subject=help>
List-Owner: <mailto:privacy-pass-owner@ietf.org>
List-Post: <mailto:privacy-pass@ietf.org>
List-Subscribe: <mailto:privacy-pass-join@ietf.org>
List-Unsubscribe: <mailto:privacy-pass-leave@ietf.org>

Thanks for all the support for the adoption of draft-yun-cfrg-arc-01!
I'd like to provide updates on the status of the draft, and in the process
address some feedback from this thread.

1. We are moving draft-yun-cfrg-arc-01 to use the Interactive Sigma
Protocols and Fiat-Shamir Transform specs, as promised!
I have a PR in flight [1] to move draft-yun-cfrg-arc-01 to
use the Interactive Sigma Protocols and Fiat-Shamir Transform specs [2, 3].
This will allow us to remove the entire "Schnorr Compiler" section of
draft-yun-cfrg-arc-01 (section 5.1 of [4]), offloading a lot of the
cryptographic complexity of the draft to those specs, which have been
adopted by the CFRG. (This also addresses the typos/bugs Eli-Shaoul found
in section 5.1 - thanks for the careful review). The PR just hasn't been
finalized yet because there are some API changes in-flight for the
Fiat-Shamir Transform spec, which are blocking - we are actively working on
that [5].

2. We are adding nonce hiding to draft-yun-cfrg-arc-01!
I mentioned in a previous email to the privacy pass group [6] that we have
had great progress with making an arbitrary-range range proof, which is
simple and straightforward to standardize. With the help of the community
(many thanks to Chris P, Lena, Michele, Jonathan, Sam, Watson and Ian),
that has come together nicely and we now have a draft for a range proof in
ARC, which is under review [7]! Once that is approved, we will use that
range proof to hide the nonce used in ARC tags. This will solve the privacy
leakage in the situation where the verifier sees two presentations with the
same nonce but different tags (with the same presentation context), and
therefore knows the two presentations must have been created from different
credentials.

3. Comparative benchmarks between ARC and privacy pass "batched" proofs
(for RSA blind signatures)
During my presentation at IETF123, the question of "what's the breakeven
point between ARC and privacy pass batched proofs" came up. I've been
working with Raphael Robert to get comparative benchmarks - this is a bit
difficult, as it depends on curve type / security parameters, as well as
having comparatively-optimized and interoperable implementations.
Furthermore, the ARC verification cost will be affected by the nonce hiding
proof, which we haven't finished yet. I'll keep this group posted once we
have more concrete numbers!

[1] https://github.com/chris-wood/draft-arc/pull/37
[2] https://datatracker.ietf.org/doc/draft-irtf-cfrg-sigma-protocols/
[3] https://datatracker.ietf.org/doc/draft-irtf-cfrg-fiat-shamir/
[4] https://datatracker.ietf.org/doc/draft-yun-cfrg-arc/
[5] https://github.com/mmaker/draft-irtf-cfrg-sigma-protocols/pull/79
[6]
https://mailarchive.ietf.org/arch/msg/privacy-pass/9q9_GAHJoXWWkPKJyBjXKmbMI3g/
[7] https://github.com/chris-wood/draft-arc/pull/38

Many thanks,
Cathie Yun

P.S. Eli-Shaoul's observation that the definition of RandomScalar() is
inconsistent in different places was a great catch. It should always return
a non-zero scalar. This mistake actually exists in the (finalized) OPRF
spec (https://datatracker.ietf.org/doc/rfc9497/) which is where I copied
the boilerplate from! Chris Wood said he will open an errata to fix this in
the OPRF spec, and I have fixed it in the ARC spec. Thanks for pointing
this out!

On Tue, Sep 16, 2025 at 7:08 AM Thibault Meunier <ot-ietf=
40thibault.uk@dmarc.ietf.org> wrote:

> I support adoption of this draft, assuming it undergoes a full review by
> the Crypto Panel [1] as mentioned in the adoption call.
>
> [1] https://wiki.ietf.org/group/cfrg/CryptoPanel
>
>
> I would not have the crypto expertise to review it in-depth, but trust
> that people in the group would, and am interested in its use cases such
> as draft-yun-privacypass-arc.
>
> Thibault
> On Wednesday, September 10th, 2025 at 7:04 PM, Christopher Patton <cpatton=
> 40cloudflare.com@dmarc.ietf.org> wrote:
>
> > I support adoption and am willing to review.
> >
> > The draft is already in pretty good shape. My feeling is that the main
> work left to do is to align with the sigma protocols draft and to work out
> how to hide the nonce. We're currently working on the latter, and the
> former has a pretty clear path.
> >
> > Great work so far Cathie and Chris!
> >
> > Best,
> > Chris p.
> >
> > On Tue, Sep 9, 2025 at 8:37 AM Benjamin Schwartz via Datatracker <
> noreply@ietf.org> wrote:
> >
> > >
> > > Subject: Call for adoption: draft-yun-cfrg-arc-01 (Ends 2025-09-30)
> > >
> > > This message starts a 3-week Call for Adoption for this document.
> > >
> > > Abstract:
> > > This document specifies the Anonymous Rate-Limited Credential (ARC)
> > > protocol, a specialization of keyed-verification anonymous
> > > credentials with support for rate limiting. ARC credentials can be
> > > presented from client to server up to some fixed number of times,
> > > where each presentation is cryptographically bound to client secrets
> > > and application-specific public information, such that each
> > > presentation is unlinkable from the others as well as the original
> > > credential creation. ARC is useful in applications where a server
> > > needs to throttle or rate-limit access from anonymous clients.
> > >
> > > File can be retrieved from:
> > > https://datatracker.ietf.org/doc/draft-yun-cfrg-arc/
> > >
> > > Please reply to this message keeping privacy-pass@ietf.org in copy by
> > > indicating whether you support or not the adoption of this draft as a
> WG
> > > document. Comments to motivate your preference are highly appreciated.
> > >
> > > Authors, and WG participants in general, are reminded of the
> Intellectual
> > > Property Rights (IPR) disclosure obligations described in BCP 79 [2].
> > > Appropriate IPR disclosures required for full conformance with the
> provisions
> > > of BCP 78 [1] and BCP 79 [2] must be filed, if you are aware of any.
> > > Sanctions available for application to violators of IETF IPR Policy
> can be
> > > found at [3].
> > >
> > > Thank you.
> > > [1] https://datatracker.ietf.org/doc/bcp78/
> > > [2] https://datatracker.ietf.org/doc/bcp79/
> > > [3] https://datatracker.ietf.org/doc/rfc6701/
> > >
> > >
> > >
> > > --
> > > Privacy-pass mailing list -- privacy-pass@ietf.org
> > > To unsubscribe send an email to privacy-pass-leave@ietf.org
>
> --
> Privacy-pass mailing list -- privacy-pass@ietf.org
> To unsubscribe send an email to privacy-pass-leave@ietf.org
>