On 8/8/12, Nick Mathewson nickm@freehaven.net wrote:
Also, where does this paper specify that the participants must check that public-key group elements are not equal to the identity element? That's rather important, as Tor's relay protocol is likely to break if an attacker can force a server to open additional circuits to an attacker using the same key material that a legitimate client's circuit has.
Robert Ransom