pull down to refresh

Our primary recommendation is for the Ashigaru development team to implement per-round RSA key rotation while maintaining the protection against per-client differentiation. This would involve generating fresh RSA keypairs for each mixing round while ensuring all participants in the same round receive the same key. Such an implementation would require cryptographic commitments or other mechanisms to prove key consistency within rounds, but would provide both short-term and long-term privacy protection.
Additionally, we recommend implementing shorter key lifetimes as an interim measure, such as daily or weekly key rotation, to limit the window for cross-round correlation attacks. The development team should also consider implementing the full ZeroLink specification with proper anonymity set isolation between rounds and forward security properties that protect past mixing sessions even if current keys are compromised.