[Privacy-pass] Re: Call for adoption: draft-yun-cfrg-arc-01 (Ends 2025-09-30)
Dennis Jackson <ietf@dennis-jackson.uk> Mon, 29 September 2025 19:33 UTC
Return-Path: <ietf@dennis-jackson.uk>
X-Original-To: privacy-pass@mail2.ietf.org
Delivered-To: privacy-pass@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 5C8AE6ACA4A3 for <privacy-pass@mail2.ietf.org>; Mon, 29 Sep 2025 12:33:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.8
X-Spam-Level:
X-Spam-Status: No, score=-2.8 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=dennis-jackson.uk
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3MqqFYNGPhOa for <privacy-pass@mail2.ietf.org>; Mon, 29 Sep 2025 12:33:50 -0700 (PDT)
Received: from mout-p-103.mailbox.org (mout-p-103.mailbox.org [IPv6:2001:67c:2050:0:465::103]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id BD5856ACA3D9 for <privacy-pass@ietf.org>; Mon, 29 Sep 2025 12:33:48 -0700 (PDT)
Received: from smtp1.mailbox.org (smtp1.mailbox.org [IPv6:2001:67c:2050:b231:465::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-103.mailbox.org (Postfix) with ESMTPS id 4cbBFF52DHz9stP for <privacy-pass@ietf.org>; Mon, 29 Sep 2025 21:33:37 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dennis-jackson.uk; s=MBO0001; t=1759174417; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=T0EcpKvxqQ5wLBzlu+Se1vA+0pY4W27FS8daXEIun6k=; b=vUdAxnZMMbsaXhqeZT1x2mVK/WKKss4fVoJl+tmvm0zOiq7VKvvIaSagvmoXBAhjVtnrKN /vIfRxPkkHliEXJi2evZHpVG+2obJF39iXbEXXvmqWQgtm9XpVq05DJA54ZkjQO5bYHBV9 /sLPz0q4UIml6FCokl0i6z3pZEIRwsjYZg6C7d3JUCJHVMcb9pU1iJhNllwDUCTvD2kbya j8Xq8OzBByiaIWfSR/PISE7kmTp1evlJ5/kwXM3mBugABjK1FshSeCrne6IyJclWc9Zf3v AdtsPGUigJcyFu2/TXHDS3gzXKbcYVN8b4GZkZHhaAR5Ddk2dITiEnvPCyU+9w==
Authentication-Results: outgoing_mbo_mout; dkim=none; spf=pass (outgoing_mbo_mout: domain of ietf@dennis-jackson.uk designates 2001:67c:2050:b231:465::1 as permitted sender) smtp.mailfrom=ietf@dennis-jackson.uk
Content-Type: multipart/alternative; boundary="------------mT9c4EyFX2zOr3uqIF0apQVc"
Message-ID: <79724c6d-978e-44d8-a6c7-0589759ea287@dennis-jackson.uk>
Date: Mon, 29 Sep 2025 20:33:36 +0100
MIME-Version: 1.0
To: privacy-pass@ietf.org
References: <175743223656.3028082.18038260620878661871@dt-datatracker-f7c8fdcb7-pjx77> <CAG2Zi22hj8x+VDfL4_D=d+E-pwJyzY7FK1Ys+VgAccPuUFZqxA@mail.gmail.com> <8q8-bBXqD0lulL8AmrhFIhWg3PEtAw7CpLyJ3rXawk8zyxcZIhcjVhaMpqhPhFbafaY5jmiZA0WshZ_ACCh43_8uFvAqSbIpbRKey8H0DPU=@thibault.uk> <CAExNBoC=OKRYgGrFis6ZA-pWUXeE-dMmvQfQoVKaqJG_VydSLw@mail.gmail.com>
Content-Language: en-US
From: Dennis Jackson <ietf@dennis-jackson.uk>
In-Reply-To: <CAExNBoC=OKRYgGrFis6ZA-pWUXeE-dMmvQfQoVKaqJG_VydSLw@mail.gmail.com>
X-Rspamd-Queue-Id: 4cbBFF52DHz9stP
Message-ID-Hash: TUMKZYECLRNHHUW2TG4IXQRDAGBALFGA
X-Message-ID-Hash: TUMKZYECLRNHHUW2TG4IXQRDAGBALFGA
X-MailFrom: ietf@dennis-jackson.uk
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Privacy-pass] Re: Call for adoption: draft-yun-cfrg-arc-01 (Ends 2025-09-30)
List-Id: Privacy Pass Protocol <privacy-pass.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/privacy-pass/QXmfHYIBozP_c7-CnB8mkhZgLOI>
List-Archive: <https://mailarchive.ietf.org/arch/browse/privacy-pass>
List-Help: <mailto:privacy-pass-request@ietf.org?subject=help>
List-Owner: <mailto:privacy-pass-owner@ietf.org>
List-Post: <mailto:privacy-pass@ietf.org>
List-Subscribe: <mailto:privacy-pass-join@ietf.org>
List-Unsubscribe: <mailto:privacy-pass-leave@ietf.org>
Thank you for the summary of all the progress Cathie, it's exciting to see! It seems like we're well supplied with expertise to develop this draft here knowing we have the CFRG as a backstop prior to WGLC. Best, Dennis On 28/09/2025 23:25, Cathie Yun wrote: > Thanks for all the support for the adoption of draft-yun-cfrg-arc-01! > I'd like to provide updates on the status of the draft, and in the > process address some feedback from this thread. > > 1. We are moving draft-yun-cfrg-arc-01 to use the Interactive Sigma > Protocols and Fiat-Shamir Transform specs, as promised! > I have a PR in flight [1] to move draft-yun-cfrg-arc-01 to > use the Interactive Sigma Protocols and Fiat-Shamir Transform specs > [2, 3]. This will allow us to remove the entire "Schnorr Compiler" > section of draft-yun-cfrg-arc-01 (section 5.1 of [4]), offloading a > lot of the cryptographic complexity of the draft to those specs, which > have been adopted by the CFRG. (This also addresses the typos/bugs > Eli-Shaoul found in section 5.1 - thanks for the careful review). The > PR just hasn't been finalized yet because there are some API changes > in-flight for the Fiat-Shamir Transform spec, which are blocking - we > are actively working on that [5]. > > 2. We are adding nonce hiding to draft-yun-cfrg-arc-01! > I mentioned in a previous email to the privacy pass group [6] that we > have had great progress with making an arbitrary-range range proof, > which is simple and straightforward to standardize. With the help of > the community (many thanks to Chris P, Lena, Michele, Jonathan, Sam, > Watson and Ian), that has come together nicely and we now have a draft > for a range proof in ARC, which is under review [7]! Once that is > approved, we will use that range proof to hide the nonce used in ARC > tags. This will solve the privacy leakage in the situation where the > verifier sees two presentations with the same nonce but different tags > (with the same presentation context), and therefore knows the two > presentations must have been created from different credentials. > > 3. Comparative benchmarks between ARC and privacy pass "batched" > proofs (for RSA blind signatures) > During my presentation at IETF123, the question of "what's the > breakeven point between ARC and privacy pass batched proofs" came up. > I've been working with Raphael Robert to get comparative benchmarks - > this is a bit difficult, as it depends on curve type / security > parameters, as well as having comparatively-optimized and > interoperable implementations. Furthermore, the ARC verification cost > will be affected by the nonce hiding proof, which we haven't finished > yet. I'll keep this group posted once we have more concrete numbers! > > [1] https://github.com/chris-wood/draft-arc/pull/37 > [2] https://datatracker.ietf.org/doc/draft-irtf-cfrg-sigma-protocols/ > [3] https://datatracker.ietf.org/doc/draft-irtf-cfrg-fiat-shamir/ > [4] https://datatracker.ietf.org/doc/draft-yun-cfrg-arc/ > [5] https://github.com/mmaker/draft-irtf-cfrg-sigma-protocols/pull/79 > [6] > https://mailarchive.ietf.org/arch/msg/privacy-pass/9q9_GAHJoXWWkPKJyBjXKmbMI3g/ > [7] https://github.com/chris-wood/draft-arc/pull/38 > > Many thanks, > Cathie Yun > > P.S. Eli-Shaoul's observation that the definition of RandomScalar() is > inconsistent in different places was a great catch. It should always > return a non-zero scalar. This mistake actually exists in the > (finalized) OPRF spec (https://datatracker.ietf.org/doc/rfc9497/) > which is where I copied the boilerplate from! Chris Wood said he will > open an errata to fix this in the OPRF spec, and I have fixed it in > the ARC spec. Thanks for pointing this out! > > On Tue, Sep 16, 2025 at 7:08 AM Thibault Meunier > <ot-ietf=40thibault.uk@dmarc.ietf.org> wrote: > > I support adoption of this draft, assuming it undergoes a full > review by the Crypto Panel [1] as mentioned in the adoption call. > > [1] https://wiki.ietf.org/group/cfrg/CryptoPanel > > > I would not have the crypto expertise to review it in-depth, but > trust that people in the group would, and am interested in its use > cases such as draft-yun-privacypass-arc. > > Thibault > On Wednesday, September 10th, 2025 at 7:04 PM, Christopher Patton > <cpatton=40cloudflare.com@dmarc.ietf.org> wrote: > > > I support adoption and am willing to review. > > > > The draft is already in pretty good shape. My feeling is that > the main work left to do is to align with the sigma protocols > draft and to work out how to hide the nonce. We're currently > working on the latter, and the former has a pretty clear path. > > > > Great work so far Cathie and Chris! > > > > Best, > > Chris p. > > > > On Tue, Sep 9, 2025 at 8:37 AM Benjamin Schwartz via Datatracker > <noreply@ietf.org> wrote: > > > > > > > > Subject: Call for adoption: draft-yun-cfrg-arc-01 (Ends > 2025-09-30) > > > > > > This message starts a 3-week Call for Adoption for this document. > > > > > > Abstract: > > > This document specifies the Anonymous Rate-Limited Credential > (ARC) > > > protocol, a specialization of keyed-verification anonymous > > > credentials with support for rate limiting. ARC credentials can be > > > presented from client to server up to some fixed number of times, > > > where each presentation is cryptographically bound to client > secrets > > > and application-specific public information, such that each > > > presentation is unlinkable from the others as well as the original > > > credential creation. ARC is useful in applications where a server > > > needs to throttle or rate-limit access from anonymous clients. > > > > > > File can be retrieved from: > > > https://datatracker.ietf.org/doc/draft-yun-cfrg-arc/ > > > > > > Please reply to this message keeping privacy-pass@ietf.org in > copy by > > > indicating whether you support or not the adoption of this > draft as a WG > > > document. Comments to motivate your preference are highly > appreciated. > > > > > > Authors, and WG participants in general, are reminded of the > Intellectual > > > Property Rights (IPR) disclosure obligations described in BCP > 79 [2]. > > > Appropriate IPR disclosures required for full conformance with > the provisions > > > of BCP 78 [1] and BCP 79 [2] must be filed, if you are aware > of any. > > > Sanctions available for application to violators of IETF IPR > Policy can be > > > found at [3]. > > > > > > Thank you. > > > [1] https://datatracker.ietf.org/doc/bcp78/ > > > [2] https://datatracker.ietf.org/doc/bcp79/ > > > [3] https://datatracker.ietf.org/doc/rfc6701/ > > > > > > > > > > > > -- > > > Privacy-pass mailing list -- privacy-pass@ietf.org > > > To unsubscribe send an email to privacy-pass-leave@ietf.org > > -- > Privacy-pass mailing list -- privacy-pass@ietf.org > To unsubscribe send an email to privacy-pass-leave@ietf.org > >
- [Privacy-pass] Call for adoption: draft-yun-cfrg-… Benjamin Schwartz via Datatracker
- [Privacy-pass] Re: Call for adoption: draft-yun-c… Watson Ladd
- [Privacy-pass] Re: Call for adoption: draft-yun-c… Tommy Pauly
- [Privacy-pass] Re: Call for adoption: draft-yun-c… Sam Schlesinger
- [Privacy-pass] Re: Call for adoption: draft-yun-c… Christopher Patton
- [Privacy-pass] Re: Call for adoption: draft-yun-c… Eli-Shaoul Khedouri
- [Privacy-pass] Re: Call for adoption: draft-yun-c… Thibault Meunier
- [Privacy-pass] Re: Call for adoption: draft-yun-c… michael
- [Privacy-pass] Re: Call for adoption: draft-yun-c… Cathie Yun
- [Privacy-pass] Re: Call for adoption: draft-yun-c… David Schinazi
- [Privacy-pass] Re: Call for adoption: draft-yun-c… Raphael Robert
- [Privacy-pass] Re: Call for adoption: draft-yun-c… Dennis Jackson
- [Privacy-pass] Re: Call for adoption: draft-yun-c… Christopher Patton
- [Privacy-pass] Re: Call for adoption: draft-yun-c… Christopher Wood
- [Privacy-pass] Re: Call for adoption: draft-yun-c… Ben Schwartz