FINDING · DEFENSE

Lox uses Chase et al.'s keyed-verification algebraic MAC anonymous credentials in a single-issuer/verifier setting with jointly-chosen credential IDs (neither party can unilaterally select them), so a fully compromised Lox Authority cannot link credential showings to specific users or reconstruct the social graph — the LA learns only that a shown credential was authentically issued.

From 2023-tulloch-loxLox: Protecting the Social Graph in Bridge Distribution · §3.1, §4.2 · 2023 · Privacy Enhancing Technologies

Implications

Tags

censors
generic
techniques
active-probing
defenses
bridgesmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.