FINDING · DEFENSE

Knowing a user's bridge assignment narrows the adversary's anonymity set to the small group sharing that bridge, deanonymizing Tor users even when the bridge itself is not compromised; rBridge addresses this using 1-out-of-m Oblivious Transfer, Pedersen commitments, and non-interactive zero-knowledge proofs so the bridge distributor learns nothing about which bridges a user holds.

From 2013-wang-rbridgerBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation · §5, §5.1 · 2013 · Network and Distributed System Security

Implications

Tags

censors
generic
defenses
bridgestor

Extracted by claude-sonnet-4-6 — review before relying.