# rate-limiting anonymous accounts

Mar 5, 2015Yesterday TechCrunch reported that Twitter now seems to be requiring SMS validation from new accounts registered over Tor. Though this might be effective for rate-limiting registration of abusive/spammy accounts, sometimes actual people use Twitter over Tor because anonymity is a prerequisite to free speech and circumventing information barriers imposed by oppressive governments. These users might not want to link their telco-sanctioned identity with their Twitter account, hence why they’re using Tor in the first place.

What are services like Twitter to do, then? I thought of one simple solution that borrows a popular idea from anonymous e-cash systems.

In a 1983 paper, cryptographer David Chaum introduced the concept of blind signatures. A blind signature is a cryptographic signature in which the signer can’t see the content of the message that she’s signing. So if Bob wants Alice to sign the message “Bob is great” without her knowing, he first “blinds” the message using a random factor that is unknown to her and gives Alice the blinded message to sign. When he unblinds her signed message by removing the blinding factor, the original message “Bob is great” *also* has a valid signature from Alice!

This may seem weird and magical, but blinded signatures are actually possible using the familiar RSA signature scheme. The proof is straightforward and on Wikipedia. Basically, since RSA signatures are just modulo’d exponentiation of some message *M* to a secret exponent *d*, when you create a signature over a blinded message *M’ = M*r^e* (where *r* is the blinding factor and *e* is the public exponent), you also create a valid signature over *M* thanks to the distributive property of exponentiation over multiplication.

Given the existence of blind signature schemes, Twitter can do something like the following to rate-limit Tor accounts without deanonymizing them:

- Say that @bob is an existing Twitter user who would like to make an anonymous account over Tor, which we’ll call @notbob. He computes
*T = H(notbob) * r^e mod N*, where*H*is a hash function,*r*is a random number that Bob chooses, and*{e,N}*is the public part of an Identity Provider’s RSA keypair (defined in step 2). - Bob sends
*T*to an identity provider. This could be Twitter itself, or any service like Google, Identica, Facebook, LinkedIn, Keybase, etc. as long as it can check that Bob is probably a real person via SMS verification or a reputation-based algorithm. If Bob seems real enough, the Identity Provider sends him S_ig(T) = T^d mod N = H(notbob)^d * r mod N_, where _d_ is the private part of the Identity Provider’s RSA keypair. - Bob divides
*Sig(T)*by*r*to get*Sig(H(notbob))*, AKA his Identity Provider’s signature over the hash of his desired anonymous username. - Bob opens up Tor browser and goes to register @notbob. In the registration form, he sends
*Sig(H(notbob))*. Twitter can then verify the Identity Provider’s signature over ‘notbob’ and**only**accept @notbob’s account registration if verification is successful!

It seems to me that this achieves some nice properties.

- Every anonymous account is transitively validated via SMS or reputation.
- Ignoring traffic analysis (admittedly a big thing to ignore), anonymous accounts and the actual identities or phone numbers used to validate them are unlinkable.

Thoughts? I’d bet that someone has thought of this use case before but I couldn’t find any references on the Internet.