I've sent a bunch of emails to the tor-access list rather quickly, but just to reiterate the most important part :
There are two very serious deanonymizaton attacks in the spec as written so far.
First, if one does not use a blinding factor indistinguishable from random that ranges over precisely the domain Z mod n, then you leak 1 bit per token to the mint.
Second, if one does not check the GCD of both the hash and the blinding factor* with the RSA modulus n, then one potentially leaks even more bits vs a malicious RSA key made from two bigish primes and several smaller primes.
In both case, any leaked bits accumulate as you spend multiple tokens, or via an intersection attack, which quickly deanonymizes users.
If one checks out GNUNet's svn repository, then one could find my commits that address these attacks in Taler by running : svn log gnunet/src/util/crypto_rsa.c | less
Just wanted to reiterate this to it didn't get buried in all the minor concerns. Jeff
* Inversion mod n might catch this on the blinding factor side, but doing it that way might give worse error reporting.
p.s. I looked more seriously at blind BLS signatures, seemingly not as bad as I'd feared, although the public key validation issues are likely to remain tougher than one normally expects, especially for this application.
tor-access@lists.torproject.org